General
-
Target
Screenshot 2025-04-13 205345.png
-
Size
8KB
-
Sample
250414-grttks11bx
-
MD5
bb483c152f242e6901d4727018702c6f
-
SHA1
55ee3611a51c75d52f78edc323e2a1ee840ffa18
-
SHA256
a8a7df96ab213b36e49d058f3394f10707030b5276bca1784f15b08cace86fd3
-
SHA512
14f3b8bcc350f7ba9a616fc85482e12d3d111119be624b70135aff7edc015ed2a50891768b6b7a1ec6911a3939c54ce9abe9cf95ea4344b0f2e0aae7eecd5bfe
-
SSDEEP
192:j6trlk/0+rLSsJO0vieLz1co1X2ZxDWpMYzIO8Vlkb:Ot50rJO0qeLzKxDWpLIOyi
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot 2025-04-13 205345.png
Resource
win10ltsc2021-20250314-en
Malware Config
Extracted
xenorat
178.83.80.11
WinStart
-
delay
5000
-
install_path
appdata
-
port
4782
-
startup_name
WinStart
Targets
-
-
Target
Screenshot 2025-04-13 205345.png
-
Size
8KB
-
MD5
bb483c152f242e6901d4727018702c6f
-
SHA1
55ee3611a51c75d52f78edc323e2a1ee840ffa18
-
SHA256
a8a7df96ab213b36e49d058f3394f10707030b5276bca1784f15b08cace86fd3
-
SHA512
14f3b8bcc350f7ba9a616fc85482e12d3d111119be624b70135aff7edc015ed2a50891768b6b7a1ec6911a3939c54ce9abe9cf95ea4344b0f2e0aae7eecd5bfe
-
SSDEEP
192:j6trlk/0+rLSsJO0vieLz1co1X2ZxDWpMYzIO8Vlkb:Ot50rJO0qeLzKxDWpLIOyi
-
Detect XenoRat Payload
-
Xenorat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3