General
-
Target
asdf.exe
-
Size
45KB
-
Sample
240511-t797qaag24
-
MD5
1a799d58a77fcc79a5ea54edb6150a5d
-
SHA1
63c262b52cf8c7f4aee513d50c4db51fea0f2d4a
-
SHA256
1c1987bcf3f8c636b5d92ce84a56b8e69abc8862c6217f655366b4f3f2582c9c
-
SHA512
9c8f58b01bb46ebe23b1bef4f76d7b9167b9c81e30ed93717235769870a712c6944d63e8f8cf5dfda71ca23510bbb56bc1148157a458a2f876d0c220ac2a88d6
-
SSDEEP
768:1dhO/poiiUcjlJInKYH9Xqk5nWEZ5SbTDaRuI7CPW5k:Lw+jjgnfH9XqcnW85SbTkuI8
Behavioral task
behavioral1
Sample
asdf.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
asdf.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
xenorat
ayumi-38161.portmap.host
Xeno_rat_nd8912d
-
delay
2000
-
install_path
appdata
-
port
38161
-
startup_name
nothingset
Targets
-
-
Target
asdf.exe
-
Size
45KB
-
MD5
1a799d58a77fcc79a5ea54edb6150a5d
-
SHA1
63c262b52cf8c7f4aee513d50c4db51fea0f2d4a
-
SHA256
1c1987bcf3f8c636b5d92ce84a56b8e69abc8862c6217f655366b4f3f2582c9c
-
SHA512
9c8f58b01bb46ebe23b1bef4f76d7b9167b9c81e30ed93717235769870a712c6944d63e8f8cf5dfda71ca23510bbb56bc1148157a458a2f876d0c220ac2a88d6
-
SSDEEP
768:1dhO/poiiUcjlJInKYH9Xqk5nWEZ5SbTDaRuI7CPW5k:Lw+jjgnfH9XqcnW85SbTkuI8
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-