General
-
Target
Pagotransferencia.exe
-
Size
243KB
-
Sample
240704-vsrmhazemj
-
MD5
cb5111a3eed8836de9ca0fac07b027eb
-
SHA1
e7623f95f9d19ed2cbbee4a869469db89fdc5559
-
SHA256
ab8f788e8f1419027d83a5089e0b85c0db66a539eabbad8797c6afa48af4350e
-
SHA512
2c872aa68c2809d93ee10ec40e03c2c7fe83f0566389de73db42dd060b032118554e522514ea9353646e33e7a97f044957822ee2f8d40afadf22094f9674af01
-
SSDEEP
6144:OAGwtabqGlzYyMCBYIhxpIZKZhXdpvbZGVMpzqArttI:OAraeGBYyzppIZKZ1dpTZpOArtW
Static task
static1
Behavioral task
behavioral1
Sample
Pagotransferencia.exe
Resource
win7-20240508-en
Malware Config
Extracted
xenorat
dns.dobiamfollollc.online
Jolid_rat_nd8889g
-
delay
61000
-
install_path
appdata
-
port
1284
-
startup_name
hns
Targets
-
-
Target
Pagotransferencia.exe
-
Size
243KB
-
MD5
cb5111a3eed8836de9ca0fac07b027eb
-
SHA1
e7623f95f9d19ed2cbbee4a869469db89fdc5559
-
SHA256
ab8f788e8f1419027d83a5089e0b85c0db66a539eabbad8797c6afa48af4350e
-
SHA512
2c872aa68c2809d93ee10ec40e03c2c7fe83f0566389de73db42dd060b032118554e522514ea9353646e33e7a97f044957822ee2f8d40afadf22094f9674af01
-
SSDEEP
6144:OAGwtabqGlzYyMCBYIhxpIZKZhXdpvbZGVMpzqArttI:OAraeGBYyzppIZKZ1dpTZpOArtW
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-