General
-
Target
doxxing tools.exe
-
Size
45KB
-
Sample
241115-2ve5tavanm
-
MD5
2c793b3221f10acac5abf94c66cdffad
-
SHA1
fc87d203a90c393a4a8077cd56e2d0440cf44eb2
-
SHA256
8cb13d52c6106edd9c40b5144b1f6c23f223fc06e65b62c096e9da9ec86cbd29
-
SHA512
f69ce3c562621663afccdd2eb53caae363efe0b53a01dac668a093ba7d0e2aa07a3c2bb7dc4eb7832e93e6491989d28940c3bf015a4cee40858775be0416b06e
-
SSDEEP
768:1dhO/poiiUcjlJIn2VH9Xqk5nWEZ5SbTDaJuI7CPW5Y:Lw+jjgn+H9XqcnW85SbTMuIg
Behavioral task
behavioral1
Sample
doxxing tools.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
Photos
Targets
-
-
Target
doxxing tools.exe
-
Size
45KB
-
MD5
2c793b3221f10acac5abf94c66cdffad
-
SHA1
fc87d203a90c393a4a8077cd56e2d0440cf44eb2
-
SHA256
8cb13d52c6106edd9c40b5144b1f6c23f223fc06e65b62c096e9da9ec86cbd29
-
SHA512
f69ce3c562621663afccdd2eb53caae363efe0b53a01dac668a093ba7d0e2aa07a3c2bb7dc4eb7832e93e6491989d28940c3bf015a4cee40858775be0416b06e
-
SSDEEP
768:1dhO/poiiUcjlJIn2VH9Xqk5nWEZ5SbTDaJuI7CPW5Y:Lw+jjgn+H9XqcnW85SbTMuIg
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-