General
-
Target
26973056c194b68b10d1c2b9a632a27e.doc
-
Size
47KB
-
Sample
241206-k8p4hazpg1
-
MD5
26973056c194b68b10d1c2b9a632a27e
-
SHA1
0b61132df948c4d48e81b631bdad91be1080f530
-
SHA256
4a58b228b23cdc286d103115b2fb312eedf6741aeada17b242620b6737db1035
-
SHA512
72a2120c4e62e91aec8cf5ec14ca42d5088944b4652dd5c69be15640bb3c260a8eb74984659f98d2161671bc4b4da0397542d4e0d24e30518374ff686ed66c2e
-
SSDEEP
384:5fFAhRp/6j1dhUsQGlWmxDJzkpiSY5UyCUuCJbnsQfzyK9tujq/z60jAx7:5KhHi3KnCWmHzk7o3JzVip
Behavioral task
behavioral1
Sample
26973056c194b68b10d1c2b9a632a27e.doc
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
87.120.120.27
Xeno_rat_nd8912d
-
delay
11000
-
install_path
appdata
-
port
2222
-
startup_name
mrec
Targets
-
-
Target
26973056c194b68b10d1c2b9a632a27e.doc
-
Size
47KB
-
MD5
26973056c194b68b10d1c2b9a632a27e
-
SHA1
0b61132df948c4d48e81b631bdad91be1080f530
-
SHA256
4a58b228b23cdc286d103115b2fb312eedf6741aeada17b242620b6737db1035
-
SHA512
72a2120c4e62e91aec8cf5ec14ca42d5088944b4652dd5c69be15640bb3c260a8eb74984659f98d2161671bc4b4da0397542d4e0d24e30518374ff686ed66c2e
-
SSDEEP
384:5fFAhRp/6j1dhUsQGlWmxDJzkpiSY5UyCUuCJbnsQfzyK9tujq/z60jAx7:5KhHi3KnCWmHzk7o3JzVip
-
Detect XenoRat Payload
-
Xenorat family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-