General
-
Target
back (2).png
-
Size
1.0MB
-
Sample
240413-dl9q3aag53
-
MD5
9a23ac8c310f99cc6301971a939570cb
-
SHA1
ae5bf076de813feaa93df4dd5145c2bd6c7e42cc
-
SHA256
70d5c81fbdd92309a3de3647e22711ecb55550f458aecd94a668e03477c72a7a
-
SHA512
f7c617d12706014bd5ef6f4fbd6a2db04035c400104f0e066054803d8871e6ee653eaeb7e733fab97f14f033ec0fcf79be8cb2aca3813306cc3f47af89e30581
-
SSDEEP
24576:tr/vtJ3UiVSlkCvWjsGkYVj7f9KB/EFAPAtBA:x/vP3uWCMVp27AtG
Static task
static1
Behavioral task
behavioral1
Sample
back (2).png
Resource
win10-20240404-en
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
nigga
Targets
-
-
Target
back (2).png
-
Size
1.0MB
-
MD5
9a23ac8c310f99cc6301971a939570cb
-
SHA1
ae5bf076de813feaa93df4dd5145c2bd6c7e42cc
-
SHA256
70d5c81fbdd92309a3de3647e22711ecb55550f458aecd94a668e03477c72a7a
-
SHA512
f7c617d12706014bd5ef6f4fbd6a2db04035c400104f0e066054803d8871e6ee653eaeb7e733fab97f14f033ec0fcf79be8cb2aca3813306cc3f47af89e30581
-
SSDEEP
24576:tr/vtJ3UiVSlkCvWjsGkYVj7f9KB/EFAPAtBA:x/vP3uWCMVp27AtG
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-