General
-
Target
15102024_0026_14102024_Transferencia.gz
-
Size
532KB
-
Sample
241015-arftdsxhqm
-
MD5
bd9334bf506f5b443fdd4f6659067ff6
-
SHA1
09bc8d81579ad9117e87c3e6c3802878f9f31279
-
SHA256
ec60a432c1a530aae177d585e8308bb5ac93622ab8c91557b6b8995911586bf5
-
SHA512
055b6ad74d8ccdf71e161f131b2f2c6f039ac7bb4aac0ebd00a7e2d336df8aebb06782db1bfc55592f28085c785cc4f0c4992ba03cee03e3be2f729e2f1783bd
-
SSDEEP
12288:KDHTWT3X29uzSSxRoXvwd2C8078/iY7Gv/9RqxC5rid:gSmumy+vo8078/iQg9RqPd
Static task
static1
Behavioral task
behavioral1
Sample
Transferencia.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
87.120.116.115
Xeno_rat_nd8912d
-
delay
50000
-
install_path
appdata
-
port
1391
-
startup_name
nothingset
Targets
-
-
Target
Transferencia.exe
-
Size
712KB
-
MD5
205f93678f0207a93801654d71ddb792
-
SHA1
4f5aa1639d9c85d93060ebecd17fbe7f0fef313c
-
SHA256
3138fbe3448390de473a313644fd2a205e7e08de043d5097b37db857c40bfad0
-
SHA512
0784187f0c40f1d428c3b982797f95c29485c43b8197ecaff305f926994222bc7e1f7de4f98205376a86f81676485c232f8732c1e756d159a5bf74d13f1f5a20
-
SSDEEP
12288:JcrNS33L10QdrX4FBojL8DPNYnyV1Rotvwd2CO078/iY7Qlz9Rq/CvrvU:0NA3R5drX4GcPNYyr2voO078/iQI9RqN
-
Detect XenoRat Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-