General
-
Target
MemReduct.zip
-
Size
20KB
-
Sample
240904-2873razbjd
-
MD5
b224408befa8d7965c4f8da5f0dde56b
-
SHA1
7f8f97c24d146e16212219bb1337f3b8a76ed529
-
SHA256
a1d210450efc6b44a3be6887b4517627548bda1dbb48850f18a3222a386ad816
-
SHA512
d249374167fda86663e599e8607df73b3f49a2b7c5033710185fe420405ddafe216803dab78efddbc295761d362acd732e44843001c50d4621fc7b44e2127ab5
-
SSDEEP
384:8kQY2WFPQ8YoU76uKRZXJ3L0SIB2aKq759PZyiprrOmTR2KiRx:8kQZWFY8YoRvgj2aKq7HZyiprrvR2KMx
Behavioral task
behavioral1
Sample
MemReduct/Memreduction22222.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
127.0.0.1
Celex
-
delay
5000
-
install_path
appdata
-
port
8080
-
startup_name
Steam_service
Targets
-
-
Target
MemReduct/Memreduction22222.exe
-
Size
45KB
-
MD5
ce1ea642a77b4bf6cbf7e8d74e800710
-
SHA1
afc6aae1d0c3aacdc7a75d6cee41a47c38a4fc14
-
SHA256
e82280dc7853b182380424e45b3494da52b00dbe80637a96614ebd23a5d06cc4
-
SHA512
b2f258c3fd14ee0166d0f420df879e4dbf0375aac91162c9948fafe7fb5bbd901b955bcf7f70fcf2b53b809b4df28f88b214065c62ed1e2b486315c8f4fdb7ae
-
SSDEEP
768:IdhO/poiiUcjlJIns3EH9Xqk5nWEZ5SbTDaauI7CPW5e:6w+jjgn+EH9XqcnW85SbT/uI2
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-