General
-
Target
a5d28ebe518095de0a4ca7143132c1de8d57bd7c9d18fb970834c1d9a682979e.exe
-
Size
161KB
-
Sample
241206-lnrl9s1lhy
-
MD5
5152fe85bb3fb27bc5c9a03bd69cdb7d
-
SHA1
f10099bbe57ee0cff489596cb04aeb914898afad
-
SHA256
a5d28ebe518095de0a4ca7143132c1de8d57bd7c9d18fb970834c1d9a682979e
-
SHA512
2b65a40ebc16bb7143060408d87dab84b3af86dfb33db4c0211febe32537a3ada1b0bd66f5a4741d22becc6e512b761026efd6039017694b0eecdb1b65572bd3
-
SSDEEP
3072:WAl8ZMA3vR2sSN+3NZHtcKfE1RKW+zJQARhGq4y6d8loubgUMOfyrAbYp:WdRZ29+3NVmw8RK71FGIjJNq
Static task
static1
Behavioral task
behavioral1
Sample
a5d28ebe518095de0a4ca7143132c1de8d57bd7c9d18fb970834c1d9a682979e.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
96.126.118.61
Microsoft Windows_3371808
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
svchost.exe
Targets
-
-
Target
a5d28ebe518095de0a4ca7143132c1de8d57bd7c9d18fb970834c1d9a682979e.exe
-
Size
161KB
-
MD5
5152fe85bb3fb27bc5c9a03bd69cdb7d
-
SHA1
f10099bbe57ee0cff489596cb04aeb914898afad
-
SHA256
a5d28ebe518095de0a4ca7143132c1de8d57bd7c9d18fb970834c1d9a682979e
-
SHA512
2b65a40ebc16bb7143060408d87dab84b3af86dfb33db4c0211febe32537a3ada1b0bd66f5a4741d22becc6e512b761026efd6039017694b0eecdb1b65572bd3
-
SSDEEP
3072:WAl8ZMA3vR2sSN+3NZHtcKfE1RKW+zJQARhGq4y6d8loubgUMOfyrAbYp:WdRZ29+3NVmw8RK71FGIjJNq
-
Xenorat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-