General
-
Target
EzFN-Manager.exe
-
Size
10.4MB
-
Sample
241026-hvwm1sseqr
-
MD5
1f24ca7841dd7d5328febbc5a8518798
-
SHA1
5424c27529156e0ab6901a4a4b46960bbaffbe09
-
SHA256
539a58a1170401dbb64c402f4e03b1c9883d30672b75198ffda7bb9640484510
-
SHA512
d91dac18fbab67481faa1092eff9b0483a42b2db49ad36b09a5b96e43c05632be3779cac2020bacf979b5efe0f4571c80f68de2ff4caeb99a836cf21bc5f62d7
-
SSDEEP
196608:kM8XyYXdMb+KCbyxS0rSZ3XEAC5D8pWvLjvROiqofozrF3DW8TKLlf8U6BhdXrOP:kM8Wb+zs43XEnl8pqLjvROiqofozZ3Dg
Static task
static1
Behavioral task
behavioral1
Sample
EzFN-Manager.exe
Resource
win11-20241007-en
Malware Config
Extracted
xenorat
kooper420-24319.portmap.host
Microsoft
-
install_path
appdata
-
port
24319
-
startup_name
Mobile Device
Targets
-
-
Target
EzFN-Manager.exe
-
Size
10.4MB
-
MD5
1f24ca7841dd7d5328febbc5a8518798
-
SHA1
5424c27529156e0ab6901a4a4b46960bbaffbe09
-
SHA256
539a58a1170401dbb64c402f4e03b1c9883d30672b75198ffda7bb9640484510
-
SHA512
d91dac18fbab67481faa1092eff9b0483a42b2db49ad36b09a5b96e43c05632be3779cac2020bacf979b5efe0f4571c80f68de2ff4caeb99a836cf21bc5f62d7
-
SSDEEP
196608:kM8XyYXdMb+KCbyxS0rSZ3XEAC5D8pWvLjvROiqofozrF3DW8TKLlf8U6BhdXrOP:kM8Wb+zs43XEnl8pqLjvROiqofozZ3Dg
Score10/10-
Detect XenoRat Payload
-
Xenorat family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-