General
-
Target
Outstanding_Payment.vbs
-
Size
10KB
-
Sample
241206-km65wsvmfk
-
MD5
c16e69631577cf98f535b3bc87449d8d
-
SHA1
66f071119d42023a1cd24387a19662cdf906ad22
-
SHA256
e11868449abb65e5cd24b8454cc993336b1fa1462f8c8b31461dcaee3c6cf0e3
-
SHA512
229c40d72a64bda855b35f959867cddbd8689a0d47adfb4bbe297af48c4c92dcaa90db5c31e06510012ad594d2196d396f6f75d1038d7772ff98c8f75431475f
-
SSDEEP
192:8tdtjLrdjOmUi27Ang2iNSiHWdhWOqVNaYFPyxDpRCI:SQmM5xN7McOTYF0MI
Static task
static1
Behavioral task
behavioral1
Sample
Outstanding_Payment.vbs
Resource
win7-20241023-en
Malware Config
Extracted
xenorat
87.120.120.27
Xeno_rat_nd8912d
-
delay
11000
-
install_path
appdata
-
port
2222
-
startup_name
mrec
Targets
-
-
Target
Outstanding_Payment.vbs
-
Size
10KB
-
MD5
c16e69631577cf98f535b3bc87449d8d
-
SHA1
66f071119d42023a1cd24387a19662cdf906ad22
-
SHA256
e11868449abb65e5cd24b8454cc993336b1fa1462f8c8b31461dcaee3c6cf0e3
-
SHA512
229c40d72a64bda855b35f959867cddbd8689a0d47adfb4bbe297af48c4c92dcaa90db5c31e06510012ad594d2196d396f6f75d1038d7772ff98c8f75431475f
-
SSDEEP
192:8tdtjLrdjOmUi27Ang2iNSiHWdhWOqVNaYFPyxDpRCI:SQmM5xN7McOTYF0MI
-
Detect XenoRat Payload
-
Xenorat family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-