General

  • Target

    Screenshot 2025-04-13 205345.png

  • Size

    8KB

  • Sample

    250414-grttks11bx

  • MD5

    bb483c152f242e6901d4727018702c6f

  • SHA1

    55ee3611a51c75d52f78edc323e2a1ee840ffa18

  • SHA256

    a8a7df96ab213b36e49d058f3394f10707030b5276bca1784f15b08cace86fd3

  • SHA512

    14f3b8bcc350f7ba9a616fc85482e12d3d111119be624b70135aff7edc015ed2a50891768b6b7a1ec6911a3939c54ce9abe9cf95ea4344b0f2e0aae7eecd5bfe

  • SSDEEP

    192:j6trlk/0+rLSsJO0vieLz1co1X2ZxDWpMYzIO8Vlkb:Ot50rJO0qeLzKxDWpLIOyi

Malware Config

Extracted

Family

xenorat

C2

178.83.80.11

Mutex

WinStart

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4782

  • startup_name

    WinStart

Targets

    • Target

      Screenshot 2025-04-13 205345.png

    • Size

      8KB

    • MD5

      bb483c152f242e6901d4727018702c6f

    • SHA1

      55ee3611a51c75d52f78edc323e2a1ee840ffa18

    • SHA256

      a8a7df96ab213b36e49d058f3394f10707030b5276bca1784f15b08cace86fd3

    • SHA512

      14f3b8bcc350f7ba9a616fc85482e12d3d111119be624b70135aff7edc015ed2a50891768b6b7a1ec6911a3939c54ce9abe9cf95ea4344b0f2e0aae7eecd5bfe

    • SSDEEP

      192:j6trlk/0+rLSsJO0vieLz1co1X2ZxDWpMYzIO8Vlkb:Ot50rJO0qeLzKxDWpLIOyi

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v16

Tasks