General
-
Target
BE_Forcer.exe
-
Size
45KB
-
Sample
240529-sq6mjaad2t
-
MD5
888405f1ed21b89ac08343458251bf26
-
SHA1
4c9b54da2336376441af26ed4bedcd6fda1b316f
-
SHA256
a8b6f84c5a83b221cb27203a565852745db0010e793aedfe2e98db4cd7f10859
-
SHA512
4280eddeaba17692a542ab11e1ad92cde5aedd0857990bea01dbd967334801318fd5c31519e58af021ff07c7cf37c2cea6c99502d7f7c1b26852cfb935e3a2a1
-
SSDEEP
768:1dhO/poiiUcjlJInYqH9Xqk5nWEZ5SbTDa3WI7CPW5R:Lw+jjgnzH9XqcnW85SbTGWI5
Behavioral task
behavioral1
Sample
BE_Forcer.exe
Resource
win7-20240215-en
Malware Config
Extracted
xenorat
23.243.100.240
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
Windows Security
Targets
-
-
Target
BE_Forcer.exe
-
Size
45KB
-
MD5
888405f1ed21b89ac08343458251bf26
-
SHA1
4c9b54da2336376441af26ed4bedcd6fda1b316f
-
SHA256
a8b6f84c5a83b221cb27203a565852745db0010e793aedfe2e98db4cd7f10859
-
SHA512
4280eddeaba17692a542ab11e1ad92cde5aedd0857990bea01dbd967334801318fd5c31519e58af021ff07c7cf37c2cea6c99502d7f7c1b26852cfb935e3a2a1
-
SSDEEP
768:1dhO/poiiUcjlJInYqH9Xqk5nWEZ5SbTDa3WI7CPW5R:Lw+jjgnzH9XqcnW85SbTGWI5
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-