General
-
Target
9890dcfe9719d9c483c69362c7e20213ceabb1886c53d853fe0b1882a771bdc2.exe
-
Size
161KB
-
Sample
241206-lsmh4sxldq
-
MD5
f1939312d11bf52d72f776cf84410d74
-
SHA1
09905b3d2ae2dc755584bf0f405e829acff60299
-
SHA256
9890dcfe9719d9c483c69362c7e20213ceabb1886c53d853fe0b1882a771bdc2
-
SHA512
5b3f03e35f0468ea2e50f447d012713c97a3b11b094fdd92156b71a3f0135a686e64843afe23e02f54210852762d04bf5896eeaa0e1055f7bccb4bb980ced3d8
-
SSDEEP
3072:ad3SoRYw/VXW80KeQoBWIJ0xKAG50NlQvh+5v4Tb2b1Nm:aZSo75WCvoBL/AGF0nb1N
Static task
static1
Behavioral task
behavioral1
Sample
9890dcfe9719d9c483c69362c7e20213ceabb1886c53d853fe0b1882a771bdc2.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
96.126.118.61
Microsoft Windows_3371808
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
svchost.exe
Targets
-
-
Target
9890dcfe9719d9c483c69362c7e20213ceabb1886c53d853fe0b1882a771bdc2.exe
-
Size
161KB
-
MD5
f1939312d11bf52d72f776cf84410d74
-
SHA1
09905b3d2ae2dc755584bf0f405e829acff60299
-
SHA256
9890dcfe9719d9c483c69362c7e20213ceabb1886c53d853fe0b1882a771bdc2
-
SHA512
5b3f03e35f0468ea2e50f447d012713c97a3b11b094fdd92156b71a3f0135a686e64843afe23e02f54210852762d04bf5896eeaa0e1055f7bccb4bb980ced3d8
-
SSDEEP
3072:ad3SoRYw/VXW80KeQoBWIJ0xKAG50NlQvh+5v4Tb2b1Nm:aZSo75WCvoBL/AGF0nb1N
-
Xenorat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-