General
-
Target
961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711
-
Size
2.4MB
-
Sample
240804-a848bawalf
-
MD5
19f800a3a545e1b561f2252b5c0e0e67
-
SHA1
67ac88d73c24ab0b7f5224d6544bab466d3cfdbd
-
SHA256
961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711
-
SHA512
fb5c0287288ac310380925a9e71dd95df6b681b8c47e782f9747d20ced82d0501db58c5626df93d8c6601363dc7fa25906128a567a6ef5ef404bce5ca394921b
-
SSDEEP
49152:lU9LXFXogd7j9ja4byzZwDNvuVxvxNlzQjxkdCv0FYtaPyZ9yLVJoWriNIZF5:lUV5HjOwGxJN+jxkdKbtaPYyLVJoY
Static task
static1
Behavioral task
behavioral1
Sample
961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711.exe
Resource
win7-20240704-en
Malware Config
Extracted
xenorat
178.214.236.32
Хост-процесс для задач Windows
-
delay
500
-
install_path
temp
-
port
3450
-
startup_name
Хост-процесс для задач Windows
Targets
-
-
Target
961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711
-
Size
2.4MB
-
MD5
19f800a3a545e1b561f2252b5c0e0e67
-
SHA1
67ac88d73c24ab0b7f5224d6544bab466d3cfdbd
-
SHA256
961bb8d539234e99855580fca5faffae8adef8d736d30deb34c678125098d711
-
SHA512
fb5c0287288ac310380925a9e71dd95df6b681b8c47e782f9747d20ced82d0501db58c5626df93d8c6601363dc7fa25906128a567a6ef5ef404bce5ca394921b
-
SSDEEP
49152:lU9LXFXogd7j9ja4byzZwDNvuVxvxNlzQjxkdCv0FYtaPyZ9yLVJoWriNIZF5:lUV5HjOwGxJN+jxkdKbtaPYyLVJoY
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-