MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5afdadce8cedaae5116cfeda28bbaaa404eab78da0294b166f4857d5825a13d5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XenoRAT


Vendor detections: 16


Intelligence 16 IOCs 1 YARA 6 File information Comments

SHA256 hash: 5afdadce8cedaae5116cfeda28bbaaa404eab78da0294b166f4857d5825a13d5
SHA3-384 hash: 32d99e9c800b850be56eb85fdc0000e6a1d6083a51ea4969d4984bfb1bf253c0a6139bea7c6a18eea3b46f9907dd02ac
SHA1 hash: 671a520327d26a074340fbf24902c8757234ba48
MD5 hash: b56f9e62246ba1a274247be7899c6e4c
humanhash: vegan-shade-ack-robin
File name:B56F9E62246BA1A274247BE7899C6E4C.exe
Download: download sample
Signature XenoRAT
File size:1'130'496 bytes
First seen:2024-07-30 08:20:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2e5467cba76f44a088d39f78c5e807b6 (131 x DCRat, 112 x njrat, 80 x RedLineStealer)
ssdeep 24576:mtFP9KwFA2GeBNbpNtu6z0XDc4NeE7uj+EkLKGNgaWFqooHgNv+82BCxb:q9r7/tu6iDXNLBR1sM5ANvl2u
Threatray 620 similar samples on MalwareBazaar
TLSH T1EA35330565EE7D67CEBA027AC39930F619B9CAB031D95E0F8D61DE2A4702BD937131C4
TrID 25.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
19.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.1% (.EXE) Win32 Executable (generic) (4504/4/1)
7.8% (.EXE) Win16/32 Executable Delphi generic (2072/23)
7.8% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:exe XenoRAT


Avatar
abuse_ch
XenoRAT C2:
178.214.236.32:3450

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
178.214.236.32:3450 https://threatfox.abuse.ch/ioc/1305068/

Intelligence


File Origin
# of uploads :
1
# of downloads :
370
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
B56F9E62246BA1A274247BE7899C6E4C.exe
Verdict:
Malicious activity
Analysis date:
2024-07-30 08:22:56 UTC
Tags:
rat remote antivm enigma xenorat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
91.7%
Tags:
Execution Generic Network Stealth Malware
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Creating a file
Creating a file in the %temp% directory
Launching a process
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
enigma lolbin mingw obfuscated packed packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
XenoRAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Sigma detected: Schedule system process
Sigma detected: Scheduled temp file as task from temp location
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected XenoRAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Dothetuk
Status:
Malicious
First seen:
2024-07-25 22:09:29 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Result
Malware family:
xenorat
Score:
  10/10
Tags:
family:xenorat discovery rat trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
XenorRat
Malware Config
C2 Extraction:
178.214.236.32
Unpacked files
SH256 hash:
5afdadce8cedaae5116cfeda28bbaaa404eab78da0294b166f4857d5825a13d5
MD5 hash:
b56f9e62246ba1a274247be7899c6e4c
SHA1 hash:
671a520327d26a074340fbf24902c8757234ba48
Detections:
SUSP_XORed_URL_In_EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:EnigmaProtector11X13XSukhovVladimirSergeNMarkin
Author:malware-lu
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:SUSP_XORed_URL_In_EXE
Author:Florian Roth (Nextron Systems)
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:SUSP_XORed_URL_in_EXE_RID2E46
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (NX_COMPAT)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
Reviews
IDCapabilitiesEvidence
SHELL_APIManipulates System Shellshell32.dll::ShellExecuteA
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryA
WIN_BASE_IO_APICan Create Filesversion.dll::GetFileVersionInfoA

Comments