General
-
Target
f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707_dump.exe
-
Size
45KB
-
Sample
240730-3k15zaverk
-
MD5
15b8e2ef54c276964ff060b418efe7ef
-
SHA1
44c15cfbcd468be279a6fc87f173215ff1f6e7a1
-
SHA256
84ab5607a472d325b4128bf0012fe9253e09a694b57bac657abf54973c9b6312
-
SHA512
565ee7fb24a42a5c0435db3a07df15e5be5ff936383257038fd13c9d02c25d3a0db0241effc6b0c64f949f83d274d2d1e926e929dd9b2c104340fc15f45d2a57
-
SSDEEP
768:WSisJmceOo5DHoMspLfFpyT7QHbtm+6EyqnN+8N4:AsJmfOmDILprj4QHbt+EH4U4
Behavioral task
behavioral1
Sample
f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707_dump.exe
Resource
win7-20240705-en
Malware Config
Extracted
xenorat
45.66.231.63
Tolid_rat_nd8889j
-
delay
40000
-
install_path
temp
-
port
1353
-
startup_name
vplayer
Targets
-
-
Target
f81185426901a3519e4d8d030d677ecf8a50d873fecfdd3980ef3ccfac785707_dump.exe
-
Size
45KB
-
MD5
15b8e2ef54c276964ff060b418efe7ef
-
SHA1
44c15cfbcd468be279a6fc87f173215ff1f6e7a1
-
SHA256
84ab5607a472d325b4128bf0012fe9253e09a694b57bac657abf54973c9b6312
-
SHA512
565ee7fb24a42a5c0435db3a07df15e5be5ff936383257038fd13c9d02c25d3a0db0241effc6b0c64f949f83d274d2d1e926e929dd9b2c104340fc15f45d2a57
-
SSDEEP
768:WSisJmceOo5DHoMspLfFpyT7QHbtm+6EyqnN+8N4:AsJmfOmDILprj4QHbt+EH4U4
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-