General
-
Target
3688756f43ff292c6431c90f7928dec6.exe
-
Size
354KB
-
Sample
240916-qlmyhszaqd
-
MD5
3688756f43ff292c6431c90f7928dec6
-
SHA1
dadf075fdc48d59398c97e3e9a83fcb45a75e02a
-
SHA256
1c19018dec9dbe68fc48099c662be25062e7a43e6658bf396c6cc8fb2f6d21af
-
SHA512
e7754f895eb8010f9aa65b476ece542ece987a5fa78cf8f4806086186f738619bd999a9f6ee416c6b64fd98dc45b05a6c20a9bb0ca1f26fe0478eee69763e4e8
-
SSDEEP
6144:7ogIz4+0PtWd4hNC2f38OdLdBTEK1DedgwbjBBJsDqB4DK0hH2I:7ogIzye2/8O9dSK1M3BBJsDqB4DK0ZL
Static task
static1
Behavioral task
behavioral1
Sample
3688756f43ff292c6431c90f7928dec6.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
154.216.17.155
Xeno_rat_nd8912d
-
delay
50010
-
install_path
appdata
-
port
1358
-
startup_name
csvc
Targets
-
-
Target
3688756f43ff292c6431c90f7928dec6.exe
-
Size
354KB
-
MD5
3688756f43ff292c6431c90f7928dec6
-
SHA1
dadf075fdc48d59398c97e3e9a83fcb45a75e02a
-
SHA256
1c19018dec9dbe68fc48099c662be25062e7a43e6658bf396c6cc8fb2f6d21af
-
SHA512
e7754f895eb8010f9aa65b476ece542ece987a5fa78cf8f4806086186f738619bd999a9f6ee416c6b64fd98dc45b05a6c20a9bb0ca1f26fe0478eee69763e4e8
-
SSDEEP
6144:7ogIz4+0PtWd4hNC2f38OdLdBTEK1DedgwbjBBJsDqB4DK0hH2I:7ogIzye2/8O9dSK1M3BBJsDqB4DK0ZL
-
Detect XenoRat Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-