General
-
Target
da118f70d089dabfab1b43b4cd87db65.exe
-
Size
51KB
-
Sample
240928-gw2d8atamb
-
MD5
da118f70d089dabfab1b43b4cd87db65
-
SHA1
6d7def883519e1099aa18c6ac2e1357edc7ea685
-
SHA256
7788f402faf2c2221307b0c90b7c97b2235d324abe07ec3965a6c21b33c0b70e
-
SHA512
7a78bbe0eb437bfaba85ee2513d1ccfca65b70e2e33187197d5891ddee42be453d9cadd883b171304135ee0679220e6c88c854572e41378c7968318908eaad3e
-
SSDEEP
768:vivdjHrddilbVauou79EoY42qCTBVwHJdSkGu2yPo+LGZYebFDaUV6RNSgNOv:opHmVauo3hv1VEnj6CSYebFlUf4v
Behavioral task
behavioral1
Sample
da118f70d089dabfab1b43b4cd87db65.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
193.149.187.135
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
mswindow
Targets
-
-
Target
da118f70d089dabfab1b43b4cd87db65.exe
-
Size
51KB
-
MD5
da118f70d089dabfab1b43b4cd87db65
-
SHA1
6d7def883519e1099aa18c6ac2e1357edc7ea685
-
SHA256
7788f402faf2c2221307b0c90b7c97b2235d324abe07ec3965a6c21b33c0b70e
-
SHA512
7a78bbe0eb437bfaba85ee2513d1ccfca65b70e2e33187197d5891ddee42be453d9cadd883b171304135ee0679220e6c88c854572e41378c7968318908eaad3e
-
SSDEEP
768:vivdjHrddilbVauou79EoY42qCTBVwHJdSkGu2yPo+LGZYebFDaUV6RNSgNOv:opHmVauo3hv1VEnj6CSYebFlUf4v
-
Detect XenoRat Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-