General
-
Target
27e2394f7b506257a8afa48049a8fe2fef59dc87957def06bd51d1d9dc191732.exe
-
Size
733KB
-
Sample
240712-rj7qksygrf
-
MD5
3920c23bc5bf04211bf972aca575e55b
-
SHA1
93537135ee51857248063359e2ba73c3c66bf98f
-
SHA256
27e2394f7b506257a8afa48049a8fe2fef59dc87957def06bd51d1d9dc191732
-
SHA512
7c93bee505f7ea9f831533d707329b85089c953263b7916806822d8b6d22593691ee47d6254b9ecaf5c96abe1f2938bbb9fef4bd95124d5e906e677490546972
-
SSDEEP
12288:PWuMuanZhZGbaWuMuanZhZGb3LAPlJ8/6vrQUACkQvBKS/L8pi9mQ47:yueZG3ueZGeS6LYQ
Static task
static1
Behavioral task
behavioral1
Sample
27e2394f7b506257a8afa48049a8fe2fef59dc87957def06bd51d1d9dc191732.exe
Resource
win7-20240705-en
Malware Config
Extracted
xenorat
77.221.152.198
Xeno_rat_nd89dsedwqdswdqwdwqdqwdqwdwqdwqdqwdqwdwqdwqd12d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
27e2394f7b506257a8afa48049a8fe2fef59dc87957def06bd51d1d9dc191732.exe
-
Size
733KB
-
MD5
3920c23bc5bf04211bf972aca575e55b
-
SHA1
93537135ee51857248063359e2ba73c3c66bf98f
-
SHA256
27e2394f7b506257a8afa48049a8fe2fef59dc87957def06bd51d1d9dc191732
-
SHA512
7c93bee505f7ea9f831533d707329b85089c953263b7916806822d8b6d22593691ee47d6254b9ecaf5c96abe1f2938bbb9fef4bd95124d5e906e677490546972
-
SSDEEP
12288:PWuMuanZhZGbaWuMuanZhZGb3LAPlJ8/6vrQUACkQvBKS/L8pi9mQ47:yueZG3ueZGeS6LYQ
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-