General
-
Target
loader_fix.exe
-
Size
7.4MB
-
Sample
240705-pxz7js1dkf
-
MD5
0a1f9a5e3d317e06d7d442254c4b1c59
-
SHA1
f28e500a0149a6293e3ef1b2fdfbf7f8c45d6635
-
SHA256
8a2dd17fafb82d2fb8674bfc8a137c6c955612088a0ac8f74e414ee3f7763b4e
-
SHA512
fd072999814d92f9f93b651c40c1639cfb17613e359b7cf57dcdecdb5eaf2cb97065e6cfb754510802df7d16c84ab61f4ce4db19fce51d419124dc9705de9a9c
-
SSDEEP
196608:uM0GdqOUunfuLvSJ2BDXdZARCqQJxzOhF4HNGgj4ubO:jndfnuLKJoXMRCqQJxyhF4lxC
Static task
static1
Behavioral task
behavioral1
Sample
loader_fix.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
xenorat
37.120.141.155
SteamUDP_FULL4
-
delay
5000
-
install_path
temp
-
port
22914
-
startup_name
SteamUDP
Targets
-
-
Target
loader_fix.exe
-
Size
7.4MB
-
MD5
0a1f9a5e3d317e06d7d442254c4b1c59
-
SHA1
f28e500a0149a6293e3ef1b2fdfbf7f8c45d6635
-
SHA256
8a2dd17fafb82d2fb8674bfc8a137c6c955612088a0ac8f74e414ee3f7763b4e
-
SHA512
fd072999814d92f9f93b651c40c1639cfb17613e359b7cf57dcdecdb5eaf2cb97065e6cfb754510802df7d16c84ab61f4ce4db19fce51d419124dc9705de9a9c
-
SSDEEP
196608:uM0GdqOUunfuLvSJ2BDXdZARCqQJxzOhF4HNGgj4ubO:jndfnuLKJoXMRCqQJxyhF4lxC
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1