MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1cc823962da2fa7a4d6fee8335ce8d92c6b44be627803cba85a1bdb8184da1d9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XenoRAT


Vendor detections: 15


Intelligence 15 IOCs YARA 7 File information Comments

SHA256 hash: 1cc823962da2fa7a4d6fee8335ce8d92c6b44be627803cba85a1bdb8184da1d9
SHA3-384 hash: fd7e62cee47f60dda694ca16505ef5fc0fb11e07237cef207a105876c43a4215bae263c0e2e4a2d1b26419b537658320
SHA1 hash: 5d09095bde071815b26624712352a9b0cc579d16
MD5 hash: 0551dcf55adc23a07d56580729730d50
humanhash: jupiter-papa-zebra-aspen
File name:1cc823962da2fa7a4d6fee8335ce8d92c6b44be627803cba85a1bdb8184da1d9
Download: download sample
Signature XenoRAT
File size:240'640 bytes
First seen:2024-07-01 14:29:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'647 x AgentTesla, 19'451 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 6144:v5N2IzPXRuvbd0hT0rh+PGdhhG1soMRxPqs9sm6I:72IzPXYZ0+l+OPcVixPqs9smP
Threatray 92 similar samples on MalwareBazaar
TLSH T1F6345A9D765072DFC867C476DEA82C64EB64747B531BC203A06726ADAE0C99BCF140F2
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 1404170f0fc2cce2 (6 x XenoRAT, 4 x Loki)
Reporter adrian__luca
Tags:exe XenoRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
331
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1cc823962da2fa7a4d6fee8335ce8d92c6b44be627803cba85a1bdb8184da1d9
Verdict:
Malicious activity
Analysis date:
2024-07-01 14:28:56 UTC
Tags:
xenorat rat amsi

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
Execution Network Stealth Msil
Result
Verdict:
Malware
Maliciousness:

Behaviour
Restart of the analyzed sample
Creating a file
Creating a file in the %AppData% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Launching a process
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
XenoRAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected XenoRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1465432 Sample: xzMyweCMgr.exe Startdate: 01/07/2024 Architecture: WINDOWS Score: 100 57 86.23.85.13.in-addr.arpa 2->57 59 171.39.242.20.in-addr.arpa 2->59 63 Found malware configuration 2->63 65 Sigma detected: Scheduled temp file as task from temp location 2->65 67 Multi AV Scanner detection for submitted file 2->67 69 5 other signatures 2->69 10 xzMyweCMgr.exe 1 2->10         started        14 xzMyweCMgr.exe 2->14         started        signatures3 process4 file5 55 C:\Users\user\AppData\...\xzMyweCMgr.exe.log, ASCII 10->55 dropped 71 Uses schtasks.exe or at.exe to add and modify task schedules 10->71 73 Injects a PE file into a foreign processes 10->73 16 xzMyweCMgr.exe 4 10->16         started        19 xzMyweCMgr.exe 5 10->19         started        22 xzMyweCMgr.exe 10->22         started        24 xzMyweCMgr.exe 14->24         started        26 xzMyweCMgr.exe 2 14->26         started        28 xzMyweCMgr.exe 2 14->28         started        signatures6 process7 dnsIp8 49 C:\Users\user\AppData\...\xzMyweCMgr.exe, PE32 16->49 dropped 51 C:\Users\...\xzMyweCMgr.exe:Zone.Identifier, ASCII 16->51 dropped 30 xzMyweCMgr.exe 16->30         started        61 91.92.248.167, 1280, 56715, 56716 THEZONEBG Bulgaria 19->61 53 C:\Users\user\AppData\Local\...\tmpADFF.tmp, ASCII 19->53 dropped 33 schtasks.exe 1 19->33         started        35 WerFault.exe 2 22->35         started        37 WerFault.exe 2 24->37         started        file9 process10 signatures11 75 Multi AV Scanner detection for dropped file 30->75 77 Machine Learning detection for dropped file 30->77 79 Injects a PE file into a foreign processes 30->79 39 xzMyweCMgr.exe 30->39         started        41 xzMyweCMgr.exe 2 30->41         started        43 xzMyweCMgr.exe 2 30->43         started        45 conhost.exe 33->45         started        process12 process13 47 WerFault.exe 2 39->47         started       
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2024-06-27 03:21:00 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
xenorat
Score:
  10/10
Tags:
family:xenorat rat trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
XenorRat
Malware Config
C2 Extraction:
91.92.248.167
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
6904c2c10ac3d272676a4c24036e3b8f9918a6162b9c5206c97432dd6f7437e1
MD5 hash:
551d75956f4f6e8f80751bbd2f676256
SHA1 hash:
c603f289a0e9622fc97699e0b20b2d63e455957d
SH256 hash:
836eb27f5d66fe307459a8c4e92207cdac824c5e5a6d1af6ab5e56fe8d047196
MD5 hash:
f4318516a16518d6e50c7c50ae5b1098
SHA1 hash:
0fb0cffeee70167f91258b63d44bee268673e859
Detections:
INDICATOR_EXE_Packed_ConfuserEx
SH256 hash:
1cc823962da2fa7a4d6fee8335ce8d92c6b44be627803cba85a1bdb8184da1d9
MD5 hash:
0551dcf55adc23a07d56580729730d50
SHA1 hash:
5d09095bde071815b26624712352a9b0cc579d16
Detections:
INDICATOR_EXE_Packed_ConfuserEx
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments