General
-
Target
zgouble.exe
-
Size
625KB
-
Sample
241120-kdw9bsyngr
-
MD5
58133b496a35609d10cc64215b5fc990
-
SHA1
dc6bb593c22e664a8d7629e0663820f9207592d1
-
SHA256
2d08e8130fcd20c4e4332010481247cf00062af6cafbbfd4cbe096a9c62d5d7d
-
SHA512
4d2a18cd02f214740d1834930246da55757ff92edec2b1fc64191ab4fc612a3a18cbaa443f9ef5329f5be6150b1487bc0f5c7bff5c5b4469c5bdd9517a526cc8
-
SSDEEP
12288:IcrNS33L10QdrX4tJD4nmvDLI0ZOZPu8+NYzv3epjcuXjc6l02gq4Ne2o:7NA3R5drX4j4m70Ee3eSuXjtvJ4sN
Static task
static1
Behavioral task
behavioral1
Sample
zgouble.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
87.120.116.115
Xeno_rat_nd8912d
-
delay
60000
-
install_path
temp
-
port
1391
-
startup_name
nothingset
Targets
-
-
Target
zgouble.exe
-
Size
625KB
-
MD5
58133b496a35609d10cc64215b5fc990
-
SHA1
dc6bb593c22e664a8d7629e0663820f9207592d1
-
SHA256
2d08e8130fcd20c4e4332010481247cf00062af6cafbbfd4cbe096a9c62d5d7d
-
SHA512
4d2a18cd02f214740d1834930246da55757ff92edec2b1fc64191ab4fc612a3a18cbaa443f9ef5329f5be6150b1487bc0f5c7bff5c5b4469c5bdd9517a526cc8
-
SSDEEP
12288:IcrNS33L10QdrX4tJD4nmvDLI0ZOZPu8+NYzv3epjcuXjc6l02gq4Ne2o:7NA3R5drX4j4m70Ee3eSuXjtvJ4sN
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-