General
-
Target
b9680d8e2432301e9626ea6e2cf95049f34c4f1a7332c3d6d02f571ab41ef888.exe
-
Size
242KB
-
Sample
240508-c9vrdahb69
-
MD5
d7c6f170f3b448d417b71c65addb6b33
-
SHA1
ba31e862e1d2606ee2ebdc91b03d5c96705a8499
-
SHA256
b9680d8e2432301e9626ea6e2cf95049f34c4f1a7332c3d6d02f571ab41ef888
-
SHA512
b39bee3a147e3593c55bb40510f4794a53aa266c9c9db7a3e74e4140dabf593fb108f32fb08a540821fc4b9556d453b47551adf2462d6ff5a8cfe58daa1097bc
-
SSDEEP
6144:EIjKgggMnaOAXf/qSDa9keprqZESPiwgt/KCiITy1VQI:EIjKd3WXfinD5e1iwgYCiITy1Vt
Static task
static1
Behavioral task
behavioral1
Sample
b9680d8e2432301e9626ea6e2cf95049f34c4f1a7332c3d6d02f571ab41ef888.exe
Resource
win7-20240220-en
Malware Config
Extracted
xenorat
dns.requimacofradian.site
Xeno_rat_nd8818g
-
delay
60000
-
install_path
appdata
-
port
1243
-
startup_name
uic
Targets
-
-
Target
b9680d8e2432301e9626ea6e2cf95049f34c4f1a7332c3d6d02f571ab41ef888.exe
-
Size
242KB
-
MD5
d7c6f170f3b448d417b71c65addb6b33
-
SHA1
ba31e862e1d2606ee2ebdc91b03d5c96705a8499
-
SHA256
b9680d8e2432301e9626ea6e2cf95049f34c4f1a7332c3d6d02f571ab41ef888
-
SHA512
b39bee3a147e3593c55bb40510f4794a53aa266c9c9db7a3e74e4140dabf593fb108f32fb08a540821fc4b9556d453b47551adf2462d6ff5a8cfe58daa1097bc
-
SSDEEP
6144:EIjKgggMnaOAXf/qSDa9keprqZESPiwgt/KCiITy1VQI:EIjKd3WXfinD5e1iwgYCiITy1Vt
-
Detects executables packed with ConfuserEx Mod
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-