General
-
Target
Blenderender.jpg
-
Size
985KB
-
Sample
250402-xq6dzsvlv8
-
MD5
1070f86513637b82b7884eba4c7acff9
-
SHA1
174ca132e7aa1b2642b25a02743069489fea6d36
-
SHA256
17a4c208d4a336a0fd8268a032fa76296baa5fd43a380a41ccab50b29e696237
-
SHA512
2214cfc7a4bad0e9cec200c8e5590684f39fae3e5225d19f9927887682f1a67ad3043ecd44e65cdd847e7fa20cab698ceac8200585b44c60f74d3e486be02ded
-
SSDEEP
24576:pKh3Pe0/Mj0xQf1L0uz0bGwB3muk3ge1w/0fixp:pK20/1xOiuwGwB3gweK/Txp
Static task
static1
Behavioral task
behavioral1
Sample
Blenderender.jpg
Resource
win10ltsc2021-20250314-en
Malware Config
Extracted
xenorat
178.83.80.11
WinStart
-
delay
5000
-
install_path
appdata
-
port
4782
-
startup_name
WinStart
Targets
-
-
Target
Blenderender.jpg
-
Size
985KB
-
MD5
1070f86513637b82b7884eba4c7acff9
-
SHA1
174ca132e7aa1b2642b25a02743069489fea6d36
-
SHA256
17a4c208d4a336a0fd8268a032fa76296baa5fd43a380a41ccab50b29e696237
-
SHA512
2214cfc7a4bad0e9cec200c8e5590684f39fae3e5225d19f9927887682f1a67ad3043ecd44e65cdd847e7fa20cab698ceac8200585b44c60f74d3e486be02ded
-
SSDEEP
24576:pKh3Pe0/Mj0xQf1L0uz0bGwB3muk3ge1w/0fixp:pK20/1xOiuwGwB3gweK/Txp
Score10/10-
Detect XenoRat Payload
-
Xenorat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Scheduled Task/Job
1Scheduled Task
1