General
-
Target
314dd9f3d257729323aa2dfaaf312b7cd54dbcc2214721eea0863a9b6353cf7a
-
Size
251KB
-
Sample
240726-spxy1ayhrb
-
MD5
a19fec1543d46acedb157ed4c17da068
-
SHA1
d50111c5a5e68da910859547d95ed9bf0ffdc79f
-
SHA256
314dd9f3d257729323aa2dfaaf312b7cd54dbcc2214721eea0863a9b6353cf7a
-
SHA512
18b9b4e50fa80b6fd2c4622cb260154238693bfeb06bc12738245f912b7e2151502524ca5805f70b1d7f2492a8cc664f0caace0ecdae62188467346788e111f3
-
SSDEEP
6144:RrhjV4Q63rq/vWq93ptqNjzsMzDFmacKtC7zK5c97Cm7I:Blh6bqWqZ34Hn/FTcDzK5c97Cms
Static task
static1
Behavioral task
behavioral1
Sample
314dd9f3d257729323aa2dfaaf312b7cd54dbcc2214721eea0863a9b6353cf7a.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
xenorat
45.66.231.63
Holid_rat_nd8859g
-
delay
60400
-
install_path
appdata
-
port
1243
-
startup_name
HDdisplay
Targets
-
-
Target
314dd9f3d257729323aa2dfaaf312b7cd54dbcc2214721eea0863a9b6353cf7a
-
Size
251KB
-
MD5
a19fec1543d46acedb157ed4c17da068
-
SHA1
d50111c5a5e68da910859547d95ed9bf0ffdc79f
-
SHA256
314dd9f3d257729323aa2dfaaf312b7cd54dbcc2214721eea0863a9b6353cf7a
-
SHA512
18b9b4e50fa80b6fd2c4622cb260154238693bfeb06bc12738245f912b7e2151502524ca5805f70b1d7f2492a8cc664f0caace0ecdae62188467346788e111f3
-
SSDEEP
6144:RrhjV4Q63rq/vWq93ptqNjzsMzDFmacKtC7zK5c97Cm7I:Blh6bqWqZ34Hn/FTcDzK5c97Cms
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-