General
-
Target
XenoClient.exe
-
Size
45KB
-
Sample
240913-mdx7qsyaqd
-
MD5
0cdc550a2b12b4a09baa7300a578169e
-
SHA1
882388f7d2afad43a7e2414ea7d0ed7c3a305498
-
SHA256
924068f7acdcc98bcdde9c3ea8ddfb323178fa70800b88f2ef79a51f5af6840a
-
SHA512
d8f62c31b4f904b3fb149c3359a917830fe6b585d15e3dabd69fb76afb033564181dfc04182cac6dbd13b7f0c058ced8c79b2b51fc15284492a09527ace82268
-
SSDEEP
768:bdhO/poiiUcjlJInITwH9Xqk5nWEZ5SbTDa2WI7CPW5p:Jw+jjgn5H9XqcnW85SbTXWIR
Behavioral task
behavioral1
Sample
XenoClient.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
20.ip.gl.ply.gg
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
45858
-
startup_name
CCleaner
Targets
-
-
Target
XenoClient.exe
-
Size
45KB
-
MD5
0cdc550a2b12b4a09baa7300a578169e
-
SHA1
882388f7d2afad43a7e2414ea7d0ed7c3a305498
-
SHA256
924068f7acdcc98bcdde9c3ea8ddfb323178fa70800b88f2ef79a51f5af6840a
-
SHA512
d8f62c31b4f904b3fb149c3359a917830fe6b585d15e3dabd69fb76afb033564181dfc04182cac6dbd13b7f0c058ced8c79b2b51fc15284492a09527ace82268
-
SSDEEP
768:bdhO/poiiUcjlJInITwH9Xqk5nWEZ5SbTDa2WI7CPW5p:Jw+jjgn5H9XqcnW85SbTXWIR
-
Detect XenoRat Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-