General
-
Target
JavaTest1.exe
-
Size
50KB
-
Sample
241009-btkqsssfmf
-
MD5
bf0dfd236ce52a5b1878da042162db3a
-
SHA1
fdd3a9ea08cdd4aceea09d3d20bf8dfa1711dcc7
-
SHA256
2b503e1b5b94615ac804982d65236744d21d64c47ce9a0447d6d45624fedf462
-
SHA512
19a4b6e097979b043edb3714776d9a538462c19cb74cd578d6dead98cf1ee0b5ada7613a2ecc1188e7b838a3dbba39fd8189841c02fbc681c81370543b23abf1
-
SSDEEP
768:wdhO/poiiUcjlJInIFH9Xqk5nWEZ5SbTDaxlWI7CPW5uidj:iw+jjgn4H9XqcnW85SbTMlWIWiB
Behavioral task
behavioral1
Sample
JavaTest1.exe
Resource
win7-20240708-en
Malware Config
Extracted
xenorat
127.0.0.1
JAVACORELESX
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
JavaTest1.exe
-
Size
50KB
-
MD5
bf0dfd236ce52a5b1878da042162db3a
-
SHA1
fdd3a9ea08cdd4aceea09d3d20bf8dfa1711dcc7
-
SHA256
2b503e1b5b94615ac804982d65236744d21d64c47ce9a0447d6d45624fedf462
-
SHA512
19a4b6e097979b043edb3714776d9a538462c19cb74cd578d6dead98cf1ee0b5ada7613a2ecc1188e7b838a3dbba39fd8189841c02fbc681c81370543b23abf1
-
SSDEEP
768:wdhO/poiiUcjlJInIFH9Xqk5nWEZ5SbTDaxlWI7CPW5uidj:iw+jjgn4H9XqcnW85SbTMlWIWiB
-
Detect XenoRat Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-