General
-
Target
Pasword a.zip
-
Size
20KB
-
Sample
240901-kja82swgqg
-
MD5
8cdbd8d4e5bf9018b928077965d74a76
-
SHA1
2ece6a83c528c89e911d482a8ce71eabd40424ba
-
SHA256
5a4e290904ff3aeaac035c7e32f84eb7bf99d5cf803d5f1ec3dbbc18577a73e4
-
SHA512
7cb854e9ab5ac263a8e2cc658d8fd56875000fea9e624a4f540b2ab916e3d4db38b81b4bd81a982a2da3190d5f45456045ce8983c1c90a77cefa1a7d6e14e654
-
SSDEEP
384:P7stzqo58nJ7Y2SHAbEzRONzR2z6XAN1dbt6VpgNMO8deoh1FP+pl6k8bH:P7sGnpYWuRCcz6C1Rt6VqoeoftRkoH
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
1
-
install_path
appdata
-
port
69
-
startup_name
System-33
Targets
-
-
Target
New folder/Fixer.exe
-
Size
45KB
-
MD5
5ef7344600895b2f13d5d8e44537d946
-
SHA1
bdf05e86b0c923a0c1edead40cc50819b185d4c0
-
SHA256
50866224673bc35d89ba701eaf3e794f452fecf308e9fab36be21fe8c486a9d0
-
SHA512
9563e4b2c98e3ccc8b47c9739a9a74680c9782f1bd18d67c80fb5f85e6bc667df72978b3d7858ddb30ba522d574215b720a2792b7e9e6d34759d0cdc2eb43c69
-
SSDEEP
768:OdhO/poiiUcjlJInMzH9Xqk5nWEZ5SbTDadWI7CPW5h:Yw+jjgnuH9XqcnW85SbTMWI5
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-