General
-
Target
Xeno Temp Spoofer.exe
-
Size
48KB
-
Sample
241026-wyv3jsvmem
-
MD5
ae54752c7443d6ad7823c7d53378fad9
-
SHA1
857798291622e0f266687e92d78cf8b2fca59476
-
SHA256
65f7aca2ea89920e1feacd898ca2245eee6d20e4da9e8c966379ff6477cb4d39
-
SHA512
8ece3fcdc15951ce96703b10d02e8d5f3d820d7c50f1e9cc8159faf73955b7911396b91312a30ca5a7602554a8dcf85e7efbffc9573e135b4d5c4a0e75238942
-
SSDEEP
768:j1gpLqIL8Goo+jitcKK/rgibI98YbBguA0ecy5cvEgK/JuqVc6KN:j1CSgtclrkzbuHnc0cnkJuqVclN
Behavioral task
behavioral1
Sample
Xeno Temp Spoofer.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
dll.sys
-
delay
1
-
install
true
-
install_file
XenoTemp Spoofer.exe
-
install_folder
%AppData%
Targets
-
-
Target
Xeno Temp Spoofer.exe
-
Size
48KB
-
MD5
ae54752c7443d6ad7823c7d53378fad9
-
SHA1
857798291622e0f266687e92d78cf8b2fca59476
-
SHA256
65f7aca2ea89920e1feacd898ca2245eee6d20e4da9e8c966379ff6477cb4d39
-
SHA512
8ece3fcdc15951ce96703b10d02e8d5f3d820d7c50f1e9cc8159faf73955b7911396b91312a30ca5a7602554a8dcf85e7efbffc9573e135b4d5c4a0e75238942
-
SSDEEP
768:j1gpLqIL8Goo+jitcKK/rgibI98YbBguA0ecy5cvEgK/JuqVc6KN:j1CSgtclrkzbuHnc0cnkJuqVclN
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-