General
-
Target
88696cf17417a2339b63f9452404c839.exe
-
Size
614KB
-
Sample
240727-j8zr9szale
-
MD5
88696cf17417a2339b63f9452404c839
-
SHA1
2123ca0e3764ba65e421d3b5dd7453da955d36f2
-
SHA256
a5f629e62e8012c0ead81b462bc05ec9d20395af3121f87961f9d2dfde908895
-
SHA512
a4236f6d52b985420dc733998842815fd24f12236bdbf3b885ed9a15c0d4815dec439cf919925b4b903ac158aba1ba2a8bf9eff20af7134d2e4edbce226f7931
-
SSDEEP
12288:WcrNS33L10QdrX2ZVncWqvo2GAhcWMuql8lPtahdkkB183kD:FNA3R5drXwVcWWyLZ8db3kD
Static task
static1
Behavioral task
behavioral1
Sample
88696cf17417a2339b63f9452404c839.exe
Resource
win7-20240704-en
Malware Config
Extracted
xenorat
45.66.231.63
Holid_rat_nd8859g
-
delay
60400
-
install_path
appdata
-
port
1243
-
startup_name
HDdisplay
Targets
-
-
Target
88696cf17417a2339b63f9452404c839.exe
-
Size
614KB
-
MD5
88696cf17417a2339b63f9452404c839
-
SHA1
2123ca0e3764ba65e421d3b5dd7453da955d36f2
-
SHA256
a5f629e62e8012c0ead81b462bc05ec9d20395af3121f87961f9d2dfde908895
-
SHA512
a4236f6d52b985420dc733998842815fd24f12236bdbf3b885ed9a15c0d4815dec439cf919925b4b903ac158aba1ba2a8bf9eff20af7134d2e4edbce226f7931
-
SSDEEP
12288:WcrNS33L10QdrX2ZVncWqvo2GAhcWMuql8lPtahdkkB183kD:FNA3R5drXwVcWWyLZ8db3kD
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-