General
-
Target
Atlantisrat.exe
-
Size
250KB
-
Sample
241122-2ex1pa1lbz
-
MD5
6d6b39d2de6789a8c1ebb5b22401bc7b
-
SHA1
6cec48b082e8839871edd8cebf7df6529a989d66
-
SHA256
2f2764f4cf7f147d0e05ebc817329e4ee20f9abf41bf2d18a0422b6e74525382
-
SHA512
a71802ed767b38ad785e5435fcd601f4a650ba6ba863ae1171ee16f3aa7bca4bdf6bcf2dece91557893eb777b76995de2a25f02327839f8d3ee363257c089fbb
-
SSDEEP
1536:Pw+jjgnyH9XqcnW85SbTvWIFAZ+r/cttjNFH1MB53FvSvoKi8G:Pw+jqs91UbTvE+ri0NgvFi8G
Behavioral task
behavioral1
Sample
Atlantisrat.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
127.0.0.1
Atlantis
-
delay
1000
-
install_path
appdata
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
Atlantisrat.exe
-
Size
250KB
-
MD5
6d6b39d2de6789a8c1ebb5b22401bc7b
-
SHA1
6cec48b082e8839871edd8cebf7df6529a989d66
-
SHA256
2f2764f4cf7f147d0e05ebc817329e4ee20f9abf41bf2d18a0422b6e74525382
-
SHA512
a71802ed767b38ad785e5435fcd601f4a650ba6ba863ae1171ee16f3aa7bca4bdf6bcf2dece91557893eb777b76995de2a25f02327839f8d3ee363257c089fbb
-
SSDEEP
1536:Pw+jjgnyH9XqcnW85SbTvWIFAZ+r/cttjNFH1MB53FvSvoKi8G:Pw+jqs91UbTvE+ri0NgvFi8G
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-