General
-
Target
XenoClient.exe
-
Size
45KB
-
Sample
240913-me9xxsyarh
-
MD5
7c43e5708ceb4163da1dce1843eb8bce
-
SHA1
e624c8ee2b16127d40b4f45843d3e32899a734d7
-
SHA256
357cbb546779bfe9e7b3772d6c15a21bad8029f2622dbf8f53c6aa8f0fe29a27
-
SHA512
b9c61bd67b3daf00f6794f4cdc4051c6771a1bf1671edb733286123986d0f53436d809afae5101fab1ac8aacbf89aa7817e64cced16d163c1c566fab2c9e6c4e
-
SSDEEP
768:vdhO/poiiUcjlJInsqH9Xqk5nWEZ5SbTDaxWI7CPW50:lw+jjgnHH9XqcnW85SbTIWIM
Behavioral task
behavioral1
Sample
XenoClient.exe
Resource
win7-20240708-en
Malware Config
Extracted
xenorat
true-britain.gl.at.ply.gg
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
45858
-
startup_name
CCleaner
Targets
-
-
Target
XenoClient.exe
-
Size
45KB
-
MD5
7c43e5708ceb4163da1dce1843eb8bce
-
SHA1
e624c8ee2b16127d40b4f45843d3e32899a734d7
-
SHA256
357cbb546779bfe9e7b3772d6c15a21bad8029f2622dbf8f53c6aa8f0fe29a27
-
SHA512
b9c61bd67b3daf00f6794f4cdc4051c6771a1bf1671edb733286123986d0f53436d809afae5101fab1ac8aacbf89aa7817e64cced16d163c1c566fab2c9e6c4e
-
SSDEEP
768:vdhO/poiiUcjlJInsqH9Xqk5nWEZ5SbTDaxWI7CPW50:lw+jjgnHH9XqcnW85SbTIWIM
-
Detect XenoRat Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-