General
-
Target
0645646e6a417573d0047b6084e4632a.bin
-
Size
582KB
-
Sample
240617-bcy7vs1cmq
-
MD5
ef86109090232d2ebf6daf8e611c2955
-
SHA1
133d5d69eb94bb1b6e15ff6e68d47646d0ab759c
-
SHA256
a0ba9c55499cf890a27dfcdee222d751e9d03aef0fbfd8f35d8d199ec4157e27
-
SHA512
df44fe66f91829fc3e510a64201ac6e3420de539c45b84f24b46d847c371a26d18f392d876883ddaebc88cfd0ccf528f19bd9508f4300810c8c2ddaf587e00f0
-
SSDEEP
12288:FZJcxjDnRmxv61MjHjaKbQPmBM+V+lYD0bpZ+L6z:RcDnExv66jHjaKbQO+Jm0rVz
Static task
static1
Behavioral task
behavioral1
Sample
7c43077f843fcf5ad00e36587087929c73702171bfb36e4c5007ea54df09e37f.xll
Resource
win7-20240611-en
Malware Config
Extracted
Extracted
xenorat
91.92.248.167
Wolid_rat_nd8889g
-
delay
60000
-
install_path
appdata
-
port
1279
-
startup_name
qns
Targets
-
-
Target
7c43077f843fcf5ad00e36587087929c73702171bfb36e4c5007ea54df09e37f.xll
-
Size
820KB
-
MD5
0645646e6a417573d0047b6084e4632a
-
SHA1
d43adf73470cb151a61482d2e5d87f3fa1420717
-
SHA256
7c43077f843fcf5ad00e36587087929c73702171bfb36e4c5007ea54df09e37f
-
SHA512
36daebde0a113fae75301f4b3bc09860b6c17788e3f132cd25cf66b1d6b726bf6df4ba80add24009bc1d5fb566359d3e4be6d54456fbbe733059e106f5878f87
-
SSDEEP
12288:BG1N4HkcgMsiOd58bzbBSrePQ0uqZzD1reWabd/T7ppePgEKB9S4566Gwa:BoOOMX1/+QHT+d77ppqWB9S4Q6y
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-