General
-
Target
dfea9fa54974479b6fe5df79b11c5c7307bec32d81c38495778d4534408c7c38.exe
-
Size
243KB
-
Sample
240515-cd4z6scc93
-
MD5
4aad0d0ea510075b228330ca1f55d242
-
SHA1
c43b2fa5fc86a597d7f9d2139dce34d017028388
-
SHA256
dfea9fa54974479b6fe5df79b11c5c7307bec32d81c38495778d4534408c7c38
-
SHA512
532e5b415efd115d490c4ba60c6753bd7904a00eb5767554ec1744b2ee453a7bc81dd407215764b0361b738b50b2b2605f2ff5924dc8cbda3bafd03ffa38fc4c
-
SSDEEP
6144:1OYJ+Mul9FCrE+9Gheadlky0fXiJ+VCDsaBEx3EyVW6c7XFI:1NcMmbCrE+Tqky0cmr3EyVW6c7O
Static task
static1
Behavioral task
behavioral1
Sample
dfea9fa54974479b6fe5df79b11c5c7307bec32d81c38495778d4534408c7c38.exe
Resource
win7-20240221-en
Malware Config
Extracted
xenorat
dns.dobiamfollollc.online
Solid_rat_nd8889g
-
delay
61000
-
install_path
appdata
-
port
1283
-
startup_name
bns
Targets
-
-
Target
dfea9fa54974479b6fe5df79b11c5c7307bec32d81c38495778d4534408c7c38.exe
-
Size
243KB
-
MD5
4aad0d0ea510075b228330ca1f55d242
-
SHA1
c43b2fa5fc86a597d7f9d2139dce34d017028388
-
SHA256
dfea9fa54974479b6fe5df79b11c5c7307bec32d81c38495778d4534408c7c38
-
SHA512
532e5b415efd115d490c4ba60c6753bd7904a00eb5767554ec1744b2ee453a7bc81dd407215764b0361b738b50b2b2605f2ff5924dc8cbda3bafd03ffa38fc4c
-
SSDEEP
6144:1OYJ+Mul9FCrE+9Gheadlky0fXiJ+VCDsaBEx3EyVW6c7XFI:1NcMmbCrE+Tqky0cmr3EyVW6c7O
-
Detects executables packed with ConfuserEx Mod
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-