General
-
Target
sus.exe
-
Size
45KB
-
Sample
241130-q8qypazmbk
-
MD5
abc9eef67fe0bd1ec7a09ded620a3d76
-
SHA1
e6ac893dbbb2fbe449463b75ec6831df208ee9af
-
SHA256
965a32e8b7471c231484f575318a8d4ce4ce442ad7644a330515ace6f5678465
-
SHA512
f5ebd783897035b6b973b29d6913870af02099ca231bc8eaec5aa8d17776846683fd385cbed46d6010b01cf515caa37a694e9b3a0c6a27b73fd9a0454a666293
-
SSDEEP
768:NdhO/poiiUcjlJIn2wH9Xqk5nWEZ5SbTDacWI7CPW5c:Dw+jjgnnH9XqcnW85SbTNWIk
Malware Config
Extracted
xenorat
lesbian-failures.gl.at.ply.gg
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
11241
-
startup_name
suss.exe
Targets
-
-
Target
sus.exe
-
Size
45KB
-
MD5
abc9eef67fe0bd1ec7a09ded620a3d76
-
SHA1
e6ac893dbbb2fbe449463b75ec6831df208ee9af
-
SHA256
965a32e8b7471c231484f575318a8d4ce4ce442ad7644a330515ace6f5678465
-
SHA512
f5ebd783897035b6b973b29d6913870af02099ca231bc8eaec5aa8d17776846683fd385cbed46d6010b01cf515caa37a694e9b3a0c6a27b73fd9a0454a666293
-
SSDEEP
768:NdhO/poiiUcjlJIn2wH9Xqk5nWEZ5SbTDacWI7CPW5c:Dw+jjgnnH9XqcnW85SbTNWIk
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-