General
-
Target
852c1f349ad9389c3d449368f59be3e7f6f7d03643e46bc2760d99ac2860ff29N
-
Size
45KB
-
Sample
241006-z8pkaswgkn
-
MD5
8d9be06b296e45eb29dcca7c0ca9f120
-
SHA1
da828a56e0669b4dff97f197618b753343a3ce18
-
SHA256
852c1f349ad9389c3d449368f59be3e7f6f7d03643e46bc2760d99ac2860ff29
-
SHA512
9e571e661d122b4d9181fadf5b5909f3c62ca4bec2a626dbf8f291e4aafec3eb1986687efe02da1ceef815031b23e2819256536aa88892df5704b53e21592931
-
SSDEEP
768:LdhO/poiiUcjlJInNqH9Xqk5nWEZ5SbTDa4WI7CPW5Q:5w+jjgn0H9XqcnW85SbTpWI4
Behavioral task
behavioral1
Sample
852c1f349ad9389c3d449368f59be3e7f6f7d03643e46bc2760d99ac2860ff29N.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
568791365f-64388.portmap.host
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
64388
-
startup_name
nothingset
Targets
-
-
Target
852c1f349ad9389c3d449368f59be3e7f6f7d03643e46bc2760d99ac2860ff29N
-
Size
45KB
-
MD5
8d9be06b296e45eb29dcca7c0ca9f120
-
SHA1
da828a56e0669b4dff97f197618b753343a3ce18
-
SHA256
852c1f349ad9389c3d449368f59be3e7f6f7d03643e46bc2760d99ac2860ff29
-
SHA512
9e571e661d122b4d9181fadf5b5909f3c62ca4bec2a626dbf8f291e4aafec3eb1986687efe02da1ceef815031b23e2819256536aa88892df5704b53e21592931
-
SSDEEP
768:LdhO/poiiUcjlJInNqH9Xqk5nWEZ5SbTDa4WI7CPW5Q:5w+jjgn0H9XqcnW85SbTpWI4
-
Detect XenoRat Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-