BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

Xeno RAT

82
Global rank
51 infographic chevron month
Month rank
68 infographic chevron week
Week rank
0
IOCs

Xeno RAT is an open-source malware mainly distributed through drive-by downloads. The core capabilities of this threat include remote control, keystroke logging, webcam and microphone access. Equipped with advanced utilities, such as Hidden Virtual Network Computing and Socks5 reverse proxy, Xeno RAT is most frequently used in attacks against individual users.

RAT
Type
Unknown
Origin
1 October, 2023
First seen
21 November, 2024
Last seen

How to analyze Xeno RAT with ANY.RUN

RAT
Type
Unknown
Origin
1 October, 2023
First seen
21 November, 2024
Last seen

IOCs

IP addresses
96.126.118.61
148.113.165.11
193.161.193.99
86.68.222.14
147.185.221.19
194.113.106.81
104.194.152.251
34.229.235.165
45.89.247.109
87.120.116.119
66.63.168.142
82.64.210.112
84.38.132.74
49.194.29.240
155.138.205.64
159.100.29.122
45.95.11.52
95.164.86.148
80.71.157.55
45.87.153.79
Domains
yoiroyse.store
nsonlines.store
nmailhostserver.store
pumaria.store
zenofs.zapto.org
nanoshield.pro
busyestinglsv.site
nanoshd.pro
roollingstonen.sytes.net
grand-merchants.gl.at.ply.gg
fusionmelonate.duckdns.org
swiftwealth.ddns.net
wealthyman.ddnsfree.com
wealthxeno.ddnsfree.com
jctestwindows.airdns.org
dentiste.ddns.net
david-login.gl.at.ply.gg
performance-ha.gl.at.ply.gg
related-directed.gl.at.ply.gg
taking-headquarters.gl.at.ply.gg
Last Seen at

Recent blog posts

post image
6 Common Persistence Mechanisms in Malware
watchers 323
comments 0
post image
Automated Interactivity: Stage 2
watchers 2186
comments 0
post image
HawkEye Malware: Technical Analysis
watchers 3149
comments 0

What is Xeno RAT malware?

Xeno RAT is an open-source remote access trojan (RAT) distributed openly through GitHub. The creator behind this malicious software states that it was created for educational purposes only. This, however, does not prevent threat actors from leveraging it in their attacks to steal sensitive data and spy on their victims.

Since Xeno RAT is available free-of-charge, there are many amateur and experienced attackers that employ it. Since 2023, the malware has been involved in several campaigns primarily targeting individual users through drive-by downloads.

Xeno RAT is written in C# and is intended to operate on Windows systems. Since the malware is being continuously updated, it poses a serious threat to organizations and users around the world.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Xeno RAT malware technical details

Xeno RAT’s range of capabilities is similar to that of other RATs, such as Asyncrat and njRAT. Some of the malicious activities that can be performed using Xeno RAT include:

  • Xeno RAT allows attackers to remotely control a victim's computer, including accessing and modifying files, installing and uninstalling software, and executing commands.
  • The malware can record every keystroke made on the infected computer, including in the offline mode.
  • One of the standout features of Xeno RAT is the ability to access the webcam and microphone of the infected computer, allowing them to spy on the victim and their surroundings.
  • The malware can be used to steal files from the device, as well as passwords stored in web browsers, email clients, and other software.
  • Attackers using Xeno RAT can also reboot the infected computer, turn off its display, and edit the registry.

Out of all features available to the attackers using the Xeno RAT malware, Hidden Virtual Network Computing offers the most extensive functionality for conducting malicious activities. This utility lets criminals not only take full control of the victim’s computer but also do it stealthily and completely without their notice.

The Socks5 reverse proxy feature of Xeno RAT allows attackers to route their network traffic through a compromised computer, effectively hiding it.

Xeno RAT usually achieves persistence on the compromised system using Scheduled Tasks. It has also been observed to leverage process injection to evade detection.

Xeno RAT execution process

To see how Xeno RAT operates, let’s upload its sample to the ANY.RUN sandbox.

The execution chain of Xeno RAT may be relatively simple, involving only one or two processes, but it can also become complex with the utilization of multiple processes, including built-in OS tools.

XenoRAT scripts in ANY.RUN Xeno RAT script analysis in ANY.RUN

The main malicious activities are carried out by the injected RegAsm process.

In our example, the execution involves multiple processes such as WScript.exe, regsvr32.exe, and RegAsm.exe. The malware creates files in the Startup directory to achieve persistence and loads the dynwrapx.dll (DynamicWrapperX) file. These activities can be monitored using Script Tracer.

For persistence and stealth, XenoRAT can bypass User Account Control (UAC) and maintain its presence even after system reboots using startup functions. It spreads primarily through phishing, exploiting software vulnerabilities, and other typical methods such as downloading from compromised websites or deceptive advertisements.

XenoRAT metadata in ANY.RUN Xeno RAT metadata in ANY.RUN

Sometimes, Xeno RAT builds may inadvertently reveal themselves by naming directories after the malware, such as "xeno rat client" or "XenoManager," or by embedding its name in PE metadata, for instance, as the company name or product name.

Xeno RAT malware distribution methods

As for the most common delivery methods, drive-by downloads constitute the main vector of Xeno RAT attacks. Individual users are the primary target of these. As a result, to trick their victims into downloading and running the malicious software, threat actors may disguise it as video games or software updates.

Conclusion

Xeno RAT’s wide range of features and capabilities, including HVNC, make it a versatile tool for conducting cyber attacks. The open-source nature of this threat highlights the importance of having proper security measures in place to prevent potential attacks.

Using a sandbox like ANY.RUN to analyze suspicious files and URLs should one of such measures. The cloud-based service allows you to detonate any malicious file in a safe and secure environment, while also having the ability to interact with the system just like on your own computer. Use ANY.RUN to study the behavior of malware, understand its TTPs, and collect indicators of compromise.

Create your ANY.RUN account – it’s free!

HAVE A LOOK AT

Sliver screenshot
Sliver
sliver
Sliver is an open-source command-and-control (C2) framework that has been increasingly adopted by threat actors as an alternative to tools like Cobalt Strike. Developed by security firm Bishop Fox, Sliver was initially intended for legitimate security testing and red teaming exercises. However, its robust features and open-source nature have made it attractive to malicious actors seeking to control compromised systems.
Read More
DarkTortilla screenshot
DarkTortilla
darktortilla
DarkTortilla is a crypter used by attackers to spread harmful software. It can modify system files to stay hidden and active. DarkTortilla is a multi-stage crypter that relies on several components to operate. It is often distributed through phishing sites that look like real services.
Read More
Mallox screenshot
Mallox
mallox
Mallox is a ransomware strain that emerged in 2021, known for its ability to encrypt files and target database servers using vulnerabilities like RDP. Often distributed through phishing campaigns and exploiting exposed SQL servers, it locks victims' data and demands a ransom. Mallox operates as a Ransomware-as-a-Service (RaaS), making it accessible to affiliates who use it to conduct attacks.
Read More
MetaStealer screenshot
MetaStealer
metastealer
MetaStealer is an info-stealing malware primarily targeting sensitive data like login credentials, payment details, and browser history. It typically infects systems via phishing emails or malicious downloads and can exfiltrate data to a command and control (C2) server. MetaStealer is known for its stealthy techniques, including evasion and persistence mechanisms, which make it difficult to detect. This malware has been actively used in various cyberattacks, particularly for financial theft and credential harvesting from individuals and organizations.
Read More
Bumblebee Loader screenshot
Bumblebee Loader
bumblebee
Bumblebee is a highly adaptable malware loader, often used by threat actors linked to the Conti and TrickBot cybercrime groups. Since its discovery in 2021, Bumblebee has been leveraged in phishing campaigns and email thread hijacking, primarily to distribute payloads like Cobalt Strike and ransomware. The malware employs obfuscation techniques, such as DLL injection and virtual environment detection, to avoid detection and sandbox analysis. Its command-and-control infrastructure and anti-analysis features allow it to persist on infected devices, where it enables further payload downloads and system compromise.
Read More
Bluesky Ransomware screenshot
BlueSky ransomware, first identified in June 2022, shares code similarities with other well-known ransomware families like Conti and Babuk. It primarily spreads via phishing emails and malicious links and can propagate through networks using SMB protocols. BlueSky uses advanced evasion techniques, such as hiding its processes from debuggers via the NtSetInformationThread API, making it difficult for analysts to detect and mitigate its attacks.
Read More