General

  • Target

    Blenderender.jpg

  • Size

    985KB

  • Sample

    250402-xq6dzsvlv8

  • MD5

    1070f86513637b82b7884eba4c7acff9

  • SHA1

    174ca132e7aa1b2642b25a02743069489fea6d36

  • SHA256

    17a4c208d4a336a0fd8268a032fa76296baa5fd43a380a41ccab50b29e696237

  • SHA512

    2214cfc7a4bad0e9cec200c8e5590684f39fae3e5225d19f9927887682f1a67ad3043ecd44e65cdd847e7fa20cab698ceac8200585b44c60f74d3e486be02ded

  • SSDEEP

    24576:pKh3Pe0/Mj0xQf1L0uz0bGwB3muk3ge1w/0fixp:pK20/1xOiuwGwB3gweK/Txp

Malware Config

Extracted

Family

xenorat

C2

178.83.80.11

Mutex

WinStart

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4782

  • startup_name

    WinStart

Targets

    • Target

      Blenderender.jpg

    • Size

      985KB

    • MD5

      1070f86513637b82b7884eba4c7acff9

    • SHA1

      174ca132e7aa1b2642b25a02743069489fea6d36

    • SHA256

      17a4c208d4a336a0fd8268a032fa76296baa5fd43a380a41ccab50b29e696237

    • SHA512

      2214cfc7a4bad0e9cec200c8e5590684f39fae3e5225d19f9927887682f1a67ad3043ecd44e65cdd847e7fa20cab698ceac8200585b44c60f74d3e486be02ded

    • SSDEEP

      24576:pKh3Pe0/Mj0xQf1L0uz0bGwB3muk3ge1w/0fixp:pK20/1xOiuwGwB3gweK/Txp

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks