General

  • Target

    Client.exe

  • Size

    112KB

  • Sample

    250402-w1l8es1xfz

  • MD5

    ae4d2ce16c802796d3b052c98f380df0

  • SHA1

    a2744daae12f133c6b6be3e366ac90947bbed748

  • SHA256

    b56aa51e6c3e6d8e4ed7a15a1480033741ee27d2e35957be742f9d799ad828f7

  • SHA512

    bfb5225d6411c913ec098ff70311302dfff76f52addb527e2790b8b766ada513af453bad0f5d3f8caa7993558fe7ebc7a2bb5ad33c5a5ad260dde6f039fe842f

  • SSDEEP

    768:0dhO/poiiUcjlJInT7ElmH9Xqk5nWEZ5SbTDawuI7CPW5aZLKEe+eJaS:Ow+jjgnPElmH9XqcnW85SbT9uIyZzS

Malware Config

Extracted

Family

xenorat

C2

178.83.80.11

Mutex

WinStart

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4782

  • startup_name

    WinStart

Targets

    • Target

      Client.exe

    • Size

      112KB

    • MD5

      ae4d2ce16c802796d3b052c98f380df0

    • SHA1

      a2744daae12f133c6b6be3e366ac90947bbed748

    • SHA256

      b56aa51e6c3e6d8e4ed7a15a1480033741ee27d2e35957be742f9d799ad828f7

    • SHA512

      bfb5225d6411c913ec098ff70311302dfff76f52addb527e2790b8b766ada513af453bad0f5d3f8caa7993558fe7ebc7a2bb5ad33c5a5ad260dde6f039fe842f

    • SSDEEP

      768:0dhO/poiiUcjlJInT7ElmH9Xqk5nWEZ5SbTDawuI7CPW5aZLKEe+eJaS:Ow+jjgnPElmH9XqcnW85SbT9uIyZzS

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks