General
-
Target
z.py
-
Size
944B
-
Sample
240407-jw61taha24
-
MD5
53208bd6bf45b2bab3cd17d972b7bcc0
-
SHA1
5b269abcb7f3ff5306517bc16bd0cdb9e4159837
-
SHA256
7aa64aad2b06dfed71dca4bcd403d9fe8e1a6d12b10a05eee75d8c00afb1fe63
-
SHA512
426398bff0cd9d34656cdede15b251ca1d5bf3a9b110cf35f7395f81bc4b2bda42e04667d008e2164d1c6709fd1ebfec95570211d55b1b5d93e8e74e3a13b236
Static task
static1
Behavioral task
behavioral1
Sample
z.py
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
z.py
Resource
win10v2004-20240226-en
Malware Config
Extracted
xenorat
6.tcp.ngrok.io
fdsfdsfsdfsdfnd8912d
-
delay
1000
-
install_path
appdata
-
port
17147
-
startup_name
Intel Processor ©
Targets
-
-
Target
z.py
-
Size
944B
-
MD5
53208bd6bf45b2bab3cd17d972b7bcc0
-
SHA1
5b269abcb7f3ff5306517bc16bd0cdb9e4159837
-
SHA256
7aa64aad2b06dfed71dca4bcd403d9fe8e1a6d12b10a05eee75d8c00afb1fe63
-
SHA512
426398bff0cd9d34656cdede15b251ca1d5bf3a9b110cf35f7395f81bc4b2bda42e04667d008e2164d1c6709fd1ebfec95570211d55b1b5d93e8e74e3a13b236
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-