General
-
Target
18092024_0114_17092024_Pago Pendiente.gz
-
Size
225KB
-
Sample
240918-blngqavcpe
-
MD5
c8f301e0def97ef0aaf4c0a225a7ef11
-
SHA1
efe302a00430e3561960414326a67190063a0f32
-
SHA256
46dbc8ab5568cc6cd6448cf32589a57f98eefebbafa8f57ec0ecd239480a6767
-
SHA512
2055fa84b8bf27a97a88abe4c2dfac1018c520310231e504cc2433c6bd5943a757cb444c31e422966492b59e7cd518f6ef549f7ce47f874c6926a78a3b42dcae
-
SSDEEP
6144:ARVE4ciK2da3BnN9O4TSGmZnKcJZjWhCVNv754rm:8L5Kia3BNBSGmZnvshCVNv754rm
Static task
static1
Behavioral task
behavioral1
Sample
Pago Pendiente.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
154.216.17.155
Xeno_rat_nd8912d
-
delay
50010
-
install_path
appdata
-
port
1359
-
startup_name
cvcr
Targets
-
-
Target
Pago Pendiente.exe
-
Size
349KB
-
MD5
801c9030471f7628b4d4420f5f39d4bc
-
SHA1
2ba63101806334f1ea3460c3eec88bb413a850a9
-
SHA256
e549d0806346bc3a34579c8af334c61be85c169bf735deb49de85b70bad3549a
-
SHA512
7255144d46c2e642ae5399ad5040c7bce508f2b332ef55d6c3cfe6450dcc0c9d8356618b439d35c177648c8fc3d06644d39ca0df431f082207bafb1445d4aa32
-
SSDEEP
6144:Gha3BXN9O4vSGmZnKkJZNGXsPrN9HbPWqqGHRZI:Ca3B9xSGmZn5+XWR9HbPWqqGHE
-
Detect XenoRat Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-