General
-
Target
b7af0c5cdc296b96ea5993fed5daa849031c5d1d7b69cb8d445406db1fb1d74b
-
Size
823KB
-
Sample
241204-my7a5stkay
-
MD5
f0da3bdc5e367bec5963e7c88279d549
-
SHA1
a44f1f9bc3829e8b5317092ab7952cabc38f0366
-
SHA256
b7af0c5cdc296b96ea5993fed5daa849031c5d1d7b69cb8d445406db1fb1d74b
-
SHA512
e1137f33a5b52ba52ac9a5a7099422a00db738ebfe130ed9b9ca13cc0cf7e62c68fb189a969a29ab1a50c6bf86b5f2aa085557abfa21f74abf9893645dc9ff33
-
SSDEEP
24576:RHDP1eovEwCWcDO6j1cV5PaNVNQjUP7JH2ELVj:RHD9PlCnDdj1cVMNVNZ1Xpj
Static task
static1
Behavioral task
behavioral1
Sample
b7af0c5cdc296b96ea5993fed5daa849031c5d1d7b69cb8d445406db1fb1d74b.exe
Resource
win7-20241023-en
Malware Config
Extracted
xenorat
74.14.71.2
Xeno_rat_nd8912d
-
delay
10
-
install_path
appdata
-
port
6969
-
startup_name
msedge
Targets
-
-
Target
b7af0c5cdc296b96ea5993fed5daa849031c5d1d7b69cb8d445406db1fb1d74b
-
Size
823KB
-
MD5
f0da3bdc5e367bec5963e7c88279d549
-
SHA1
a44f1f9bc3829e8b5317092ab7952cabc38f0366
-
SHA256
b7af0c5cdc296b96ea5993fed5daa849031c5d1d7b69cb8d445406db1fb1d74b
-
SHA512
e1137f33a5b52ba52ac9a5a7099422a00db738ebfe130ed9b9ca13cc0cf7e62c68fb189a969a29ab1a50c6bf86b5f2aa085557abfa21f74abf9893645dc9ff33
-
SSDEEP
24576:RHDP1eovEwCWcDO6j1cV5PaNVNQjUP7JH2ELVj:RHD9PlCnDdj1cVMNVNZ1Xpj
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-