General
-
Target
AngelHax.exe
-
Size
12.9MB
-
Sample
240427-cwjf7ahb72
-
MD5
f2d9ce218f902d2e7878be834e0ebae3
-
SHA1
502b5b506cb630d5e54b0110939dad4a98d45a4c
-
SHA256
269c392423c81d490122c375c7883ab452c4896ec50fad4a4f19825b501847fa
-
SHA512
b8c159b4c65befef350bfb22c5f76fd9317303472f4f674d9528985477c3cd77524e757ee60fa213c60e4e9602432cf7d7ba62f8ba8b32cacd1f8da158300718
-
SSDEEP
393216:IDA3alBdcGM5Qh47Ua/SymzvV9v6soQjWz3yiQUUPesBb:qTlHxv+7UiuzvLCsFW7RQUUPeSb
Static task
static1
Behavioral task
behavioral1
Sample
AngelHax.exe
Resource
win11-20240419-en
Malware Config
Extracted
xenorat
jctestwindows.airdns.org
Xeno_rat_nd8913d
-
delay
5000
-
install_path
temp
-
port
45010
-
startup_name
WindowsErrorHandler
Extracted
growtopia
https://discord.com/api/webhooks/1199763266872803338/8vedcXoMcyExhe1xhBm5f8ncmafWmOB3pkulE0l8g9Pel0t3ziyr2V51cLTVEjYsE4Rj
Targets
-
-
Target
AngelHax.exe
-
Size
12.9MB
-
MD5
f2d9ce218f902d2e7878be834e0ebae3
-
SHA1
502b5b506cb630d5e54b0110939dad4a98d45a4c
-
SHA256
269c392423c81d490122c375c7883ab452c4896ec50fad4a4f19825b501847fa
-
SHA512
b8c159b4c65befef350bfb22c5f76fd9317303472f4f674d9528985477c3cd77524e757ee60fa213c60e4e9602432cf7d7ba62f8ba8b32cacd1f8da158300718
-
SSDEEP
393216:IDA3alBdcGM5Qh47Ua/SymzvV9v6soQjWz3yiQUUPesBb:qTlHxv+7UiuzvLCsFW7RQUUPeSb
-
Detect ZGRat V1
-
Creates new service(s)
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-