General
-
Target
ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
-
Size
242KB
-
Sample
240601-cf2b3aea4z
-
MD5
5910e4d900fcda28e32e7f7bf7d24487
-
SHA1
60f61f3719fe959563de46b53c2547a39235a090
-
SHA256
ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c
-
SHA512
fb71156f713496b96b6e939048c581012d863cad54e5f9404d2d7717962c3d53ff185fb4e2d303bb9b3dcda3e5926e2955fe7f7f36fd3d5afb305449c20b41e1
-
SSDEEP
6144:vDW47RVrcLlgIV4631u+b4R+vUYmGiL2UU3rq+NdI:vDj77cLlgq319bgX/L2UU3rq+NG
Static task
static1
Behavioral task
behavioral1
Sample
ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
Resource
win7-20240215-en
Malware Config
Extracted
xenorat
dns.dobiamfollollc.online
Jolid_rat_nd8889g
-
delay
61000
-
install_path
appdata
-
port
1284
-
startup_name
hns
Targets
-
-
Target
ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c.exe
-
Size
242KB
-
MD5
5910e4d900fcda28e32e7f7bf7d24487
-
SHA1
60f61f3719fe959563de46b53c2547a39235a090
-
SHA256
ffca962687d50ad9f158e62a6c042efe67fbb9bdad9799ccd60762c03466d13c
-
SHA512
fb71156f713496b96b6e939048c581012d863cad54e5f9404d2d7717962c3d53ff185fb4e2d303bb9b3dcda3e5926e2955fe7f7f36fd3d5afb305449c20b41e1
-
SSDEEP
6144:vDW47RVrcLlgIV4631u+b4R+vUYmGiL2UU3rq+NdI:vDj77cLlgq319bgX/L2UU3rq+NG
-
Detects executables packed with ConfuserEx Mod
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-