General
-
Target
3442baf899fcdef2f78165a69ad2c10a77576d0b0bae94f15a41341b01ad32b7
-
Size
243KB
-
Sample
240514-y4y3hafb87
-
MD5
0e9b2c5f8304300edb087bc435bd0ae2
-
SHA1
05818c31d64d6766f7d641cdac52a7782c7af31f
-
SHA256
3442baf899fcdef2f78165a69ad2c10a77576d0b0bae94f15a41341b01ad32b7
-
SHA512
cd25dd9493eb46ea4b76a46e227894b20146c6cb2ad432a6b163c1dcc602be16b0c941ca06e1a5685ec8e1bdb186b07af6bf37c07e9f0a2a015c28bbb1ccebad
-
SSDEEP
6144:6/uCoiIRe9955vZCfIuCNVj5D8Rv7cmlBNCdG1O3ppufUsTI:6/uCo9eP55vZoWv5AVlBNCdG1O3ppufW
Static task
static1
Behavioral task
behavioral1
Sample
3442baf899fcdef2f78165a69ad2c10a77576d0b0bae94f15a41341b01ad32b7.exe
Resource
win7-20240221-en
Malware Config
Extracted
xenorat
dns.requimacofradian.site
Xeno_rat_nd8818g
-
delay
60000
-
install_path
appdata
-
port
1243
-
startup_name
uic
Targets
-
-
Target
3442baf899fcdef2f78165a69ad2c10a77576d0b0bae94f15a41341b01ad32b7
-
Size
243KB
-
MD5
0e9b2c5f8304300edb087bc435bd0ae2
-
SHA1
05818c31d64d6766f7d641cdac52a7782c7af31f
-
SHA256
3442baf899fcdef2f78165a69ad2c10a77576d0b0bae94f15a41341b01ad32b7
-
SHA512
cd25dd9493eb46ea4b76a46e227894b20146c6cb2ad432a6b163c1dcc602be16b0c941ca06e1a5685ec8e1bdb186b07af6bf37c07e9f0a2a015c28bbb1ccebad
-
SSDEEP
6144:6/uCoiIRe9955vZCfIuCNVj5D8Rv7cmlBNCdG1O3ppufUsTI:6/uCo9eP55vZoWv5AVlBNCdG1O3ppufW
-
Detects executables packed with ConfuserEx Mod
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-