General
-
Target
QuoteList.scr.exe
-
Size
569KB
-
Sample
240930-nnp5jsxcrf
-
MD5
dc2bce43a2b3398e375fdb600650a576
-
SHA1
a6c6ccf9affa2095eb481950f036c00cd3c4e437
-
SHA256
509070cd30eb4cb05c29fe8cb222166c1c7db0f6084ea5b91e37bac79c14ac30
-
SHA512
e8591426a0d5c71cbff9ba465742a2d989cffc03b986d46961e5098d72b62df917130251d7860a2b1c622d966f94a2272eeeaf037af5f535842bf5177eb2cba0
-
SSDEEP
12288:8NUxwjxPMBCqh/pe8hkbikWQYXLEtYt+tyKsI3TBB9kR:8NUxh//Q8hkz1wL1+tlBBg
Static task
static1
Behavioral task
behavioral1
Sample
QuoteList.scr.exe
Resource
win7-20240729-en
Malware Config
Extracted
xenorat
66.63.168.142
Microsoft_nd8912d
-
delay
5
-
install_path
temp
-
port
4782
-
startup_name
nothingset
Targets
-
-
Target
QuoteList.scr.exe
-
Size
569KB
-
MD5
dc2bce43a2b3398e375fdb600650a576
-
SHA1
a6c6ccf9affa2095eb481950f036c00cd3c4e437
-
SHA256
509070cd30eb4cb05c29fe8cb222166c1c7db0f6084ea5b91e37bac79c14ac30
-
SHA512
e8591426a0d5c71cbff9ba465742a2d989cffc03b986d46961e5098d72b62df917130251d7860a2b1c622d966f94a2272eeeaf037af5f535842bf5177eb2cba0
-
SSDEEP
12288:8NUxwjxPMBCqh/pe8hkbikWQYXLEtYt+tyKsI3TBB9kR:8NUxh//Q8hkz1wL1+tlBBg
-
Detect XenoRat Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1