General
-
Target
9f72418108ed402001ade698829d98ab7a867d1ea481831181038f098e5262de
-
Size
249KB
-
Sample
240726-y59wdssepr
-
MD5
84aa2c3d7f31b73042edc61094fd677b
-
SHA1
594202fb465b80420362128affef4b82c5a6c6eb
-
SHA256
9f72418108ed402001ade698829d98ab7a867d1ea481831181038f098e5262de
-
SHA512
c7116d3929b3f184592c7886768ee3db66ea04c180a77148c93435a643efcf105de63e135e09ed93737a747190a3156f0e3ad0f841b04137cc6838e1cb76c926
-
SSDEEP
6144:DfRQsStLEhDY0Vh29826tczDztg1YxKuJAIiyUBI:bYihDFq9RgGtg1YxKuJAIiyU6
Static task
static1
Behavioral task
behavioral1
Sample
9f72418108ed402001ade698829d98ab7a867d1ea481831181038f098e5262de.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
xenorat
45.66.231.63
Holid_rat_nd8859g
-
delay
60400
-
install_path
appdata
-
port
1243
-
startup_name
HDdisplay
Targets
-
-
Target
9f72418108ed402001ade698829d98ab7a867d1ea481831181038f098e5262de
-
Size
249KB
-
MD5
84aa2c3d7f31b73042edc61094fd677b
-
SHA1
594202fb465b80420362128affef4b82c5a6c6eb
-
SHA256
9f72418108ed402001ade698829d98ab7a867d1ea481831181038f098e5262de
-
SHA512
c7116d3929b3f184592c7886768ee3db66ea04c180a77148c93435a643efcf105de63e135e09ed93737a747190a3156f0e3ad0f841b04137cc6838e1cb76c926
-
SSDEEP
6144:DfRQsStLEhDY0Vh29826tczDztg1YxKuJAIiyUBI:bYihDFq9RgGtg1YxKuJAIiyU6
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1