General

  • Target

    fn.exe

  • Size

    45KB

  • Sample

    250415-ecwcraxlz4

  • MD5

    224ccb2529301b657df7c6bcc7ac6613

  • SHA1

    1743e1b819c6a20ec5b8db1024a4f460160419e7

  • SHA256

    7d5ff178c46801beba098d2705798c99392e15dbc9ccdef3e11ed737d9dfb93d

  • SHA512

    c09509172cb3a662ba8cf5b1df1a4c45dc014c59388f219ed819e08890bd522e4c367e46e91740c1cf636f419e30b66f7022a23216a108e3132905a4ca319307

  • SSDEEP

    768:FdhO/poiiUcjlJInbzH9Xqk5nWEZ5SbTDagWI7CPW5N:bw+jjgn3H9XqcnW85SbTpWIl

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    10

  • install_path

    temp

  • port

    4444

  • startup_name

    fortnite

Targets

    • Target

      fn.exe

    • Size

      45KB

    • MD5

      224ccb2529301b657df7c6bcc7ac6613

    • SHA1

      1743e1b819c6a20ec5b8db1024a4f460160419e7

    • SHA256

      7d5ff178c46801beba098d2705798c99392e15dbc9ccdef3e11ed737d9dfb93d

    • SHA512

      c09509172cb3a662ba8cf5b1df1a4c45dc014c59388f219ed819e08890bd522e4c367e46e91740c1cf636f419e30b66f7022a23216a108e3132905a4ca319307

    • SSDEEP

      768:FdhO/poiiUcjlJInbzH9Xqk5nWEZ5SbTDagWI7CPW5N:bw+jjgn3H9XqcnW85SbTpWIl

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v16

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.