General
-
Target
6621fcab4de5fab7eac4d8d03c87f233.bin
-
Size
181KB
-
Sample
240704-vd4zaa1gqg
-
MD5
c416619cafdb4022447b64c379a7e1f8
-
SHA1
0e9edfab6d4c9dc35d61536536c4a149ca3e7182
-
SHA256
d43587c87eacc8e66d9108b021859c515486308011a1f9eea7c3f0bc42f018f2
-
SHA512
7819a742dfb43c537df17206584523d68928a0c47b8bcf479fcf75ef838715f9a7b98cefa70facb8ecc5d1dc4510ed72a7909e28500515c8cafa5db913a8cbf5
-
SSDEEP
3072:fdWlprkpsrpPsLRgW9orzHQM85jXtn264XHCH7a+v8v9UDdsfxgMpu:gLOVwzr85jXtnnH+6dsCt
Static task
static1
Behavioral task
behavioral1
Sample
ac781121f63db7be4e5c79ea106118ce2c7a06f0abef01be3e54ff77351691e2.exe
Resource
win7-20240508-en
Malware Config
Extracted
xenorat
91.92.248.167
Wolid_rat_nd8859g
-
delay
60000
-
install_path
appdata
-
port
1280
-
startup_name
cms
Targets
-
-
Target
ac781121f63db7be4e5c79ea106118ce2c7a06f0abef01be3e54ff77351691e2.exe
-
Size
221KB
-
MD5
6621fcab4de5fab7eac4d8d03c87f233
-
SHA1
70dd77e26e803239877b30439eb123454bc137cc
-
SHA256
ac781121f63db7be4e5c79ea106118ce2c7a06f0abef01be3e54ff77351691e2
-
SHA512
d132d2399c65b6b0083f7172c04d4708b28b3deceb93fd0c5dfc5bcfdfd9ee459c5b46853d176e08e99a2a8842945e6cd396e4137fac430c67abea388e83789c
-
SSDEEP
6144:WdwDpybdvNg134Gnq2YZstYaGaqjWq9441D/Kv+I:/cE134GiZ4Ya7mWq9441D/Kvj
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-