General
-
Target
fe1ee9ecac4633907bf564b4c4068f0a4c32887138312e93653ba6954478a053.exe
-
Size
161KB
-
Sample
241206-lm7l4axjeq
-
MD5
eae424bb5a92a40374cb234de298199b
-
SHA1
8ae3cfd89a3b102e50e6b0d66b4ba09708115373
-
SHA256
fe1ee9ecac4633907bf564b4c4068f0a4c32887138312e93653ba6954478a053
-
SHA512
b7fa10021ffdc687b062954ac0b960279dd3a6d3178189fe60e2257085358af214d864be5970e6daf3016d947443f48c6ca7cb78afa4ba5111f9d4095a07c4db
-
SSDEEP
3072:sd3SoRYw/VXW80KeQoBWIJ0xKAG50NlQvh+5v4TR2b1Nm:sZSo75WCvoBL/AGF05b1N
Static task
static1
Behavioral task
behavioral1
Sample
fe1ee9ecac4633907bf564b4c4068f0a4c32887138312e93653ba6954478a053.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
96.126.118.61
Microsoft Windows_3371808
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
svchost.exe
Targets
-
-
Target
fe1ee9ecac4633907bf564b4c4068f0a4c32887138312e93653ba6954478a053.exe
-
Size
161KB
-
MD5
eae424bb5a92a40374cb234de298199b
-
SHA1
8ae3cfd89a3b102e50e6b0d66b4ba09708115373
-
SHA256
fe1ee9ecac4633907bf564b4c4068f0a4c32887138312e93653ba6954478a053
-
SHA512
b7fa10021ffdc687b062954ac0b960279dd3a6d3178189fe60e2257085358af214d864be5970e6daf3016d947443f48c6ca7cb78afa4ba5111f9d4095a07c4db
-
SSDEEP
3072:sd3SoRYw/VXW80KeQoBWIJ0xKAG50NlQvh+5v4TR2b1Nm:sZSo75WCvoBL/AGF05b1N
-
Xenorat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-