General
-
Target
15ad522ec1e3313921cb6d311a87bca109ac311a3bfd416019fe64a7c60b3dc1.exe
-
Size
657KB
-
Sample
240908-brvszswflq
-
MD5
7ba37f3ac2258f9a33ebd1330617ef41
-
SHA1
b995513d63a7bd394099b44e7cc3269f5d02acc4
-
SHA256
15ad522ec1e3313921cb6d311a87bca109ac311a3bfd416019fe64a7c60b3dc1
-
SHA512
0e31d37d86885e2ed8e70756adbab74540273299cad2ed71ea90fd9718d0f019c88f450bb92a1a0ea6419eb02c3c3ade96e3448170c2857ba2ba1dc31a891995
-
SSDEEP
12288:NcrNS33L10QdrXjivfDnCr9BzOZ/fb67UjVXUSUp9Cq3wYNsMU3yRs:wNA3R5drXWvfDCr9ByNfb6ojZpOxwoRm
Static task
static1
Behavioral task
behavioral1
Sample
15ad522ec1e3313921cb6d311a87bca109ac311a3bfd416019fe64a7c60b3dc1.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
154.216.17.155
Xeno_rat_nd8912d
-
delay
50000
-
install_path
appdata
-
port
1357
-
startup_name
crsr
Targets
-
-
Target
15ad522ec1e3313921cb6d311a87bca109ac311a3bfd416019fe64a7c60b3dc1.exe
-
Size
657KB
-
MD5
7ba37f3ac2258f9a33ebd1330617ef41
-
SHA1
b995513d63a7bd394099b44e7cc3269f5d02acc4
-
SHA256
15ad522ec1e3313921cb6d311a87bca109ac311a3bfd416019fe64a7c60b3dc1
-
SHA512
0e31d37d86885e2ed8e70756adbab74540273299cad2ed71ea90fd9718d0f019c88f450bb92a1a0ea6419eb02c3c3ade96e3448170c2857ba2ba1dc31a891995
-
SSDEEP
12288:NcrNS33L10QdrXjivfDnCr9BzOZ/fb67UjVXUSUp9Cq3wYNsMU3yRs:wNA3R5drXWvfDCr9ByNfb6ojZpOxwoRm
-
Detect XenoRat Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-