General
-
Target
Pangya56.exe
-
Size
45KB
-
Sample
241110-njczesypan
-
MD5
37e143ec80feaeef29e906bb0ca6f7bf
-
SHA1
603fd25c94f0030186250472d8e74ebc85d1abdb
-
SHA256
d21d4ed60c7c91365c7717e573c0b9849a170b3b66604367755470e0201debfd
-
SHA512
e59874b7eef2964740e17167b25ddccaec17b8214fc5191bf6f641c6c7f176b6c08f1c1314c1b058a94e774d40e1e6c0e9a7874bd897b3e823974d73168bdad0
-
SSDEEP
768:vdhO/poiiUcjlJIngQuH9Xqk5nWEZ5SbTDafWI7CPW5C:lw+jjgnYH9XqcnW85SbTGWIa
Behavioral task
behavioral1
Sample
Pangya56.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
127.0.0.1
PC-1
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
Pangya56
Targets
-
-
Target
Pangya56.exe
-
Size
45KB
-
MD5
37e143ec80feaeef29e906bb0ca6f7bf
-
SHA1
603fd25c94f0030186250472d8e74ebc85d1abdb
-
SHA256
d21d4ed60c7c91365c7717e573c0b9849a170b3b66604367755470e0201debfd
-
SHA512
e59874b7eef2964740e17167b25ddccaec17b8214fc5191bf6f641c6c7f176b6c08f1c1314c1b058a94e774d40e1e6c0e9a7874bd897b3e823974d73168bdad0
-
SSDEEP
768:vdhO/poiiUcjlJIngQuH9Xqk5nWEZ5SbTDafWI7CPW5C:lw+jjgnYH9XqcnW85SbTGWIa
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-