General
-
Target
195928ce3054739020a7985c9ac1d652382da4df5dbfab8b46979a07989b16c7.vbs
-
Size
10KB
-
Sample
241208-cjd1ya1rhj
-
MD5
045d8d61f86f0d65f12f5c86c5ae2239
-
SHA1
24d19c6daf69f931cf0d87400057ba48ac720c73
-
SHA256
195928ce3054739020a7985c9ac1d652382da4df5dbfab8b46979a07989b16c7
-
SHA512
5709553a258cfb3ea4a355513a8217a539360e79f0db852d5639d327bf02a2901ac8955ecb2633be3d955cdecaf94e7ed949a9d165f87e734a82c9605c920cbf
-
SSDEEP
96:PXVr+kLYdhQg41LcGo5z05lj1iJYaaWK15xgIl5oR8y70zPwP9j9py1evpMr0sIC:PlVg4aUiyPxhoR8y7AOFA0sIogiXIW
Static task
static1
Behavioral task
behavioral1
Sample
195928ce3054739020a7985c9ac1d652382da4df5dbfab8b46979a07989b16c7.vbs
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
dns.stipamana.com
Xeno_rat_nd8912d
-
delay
12000
-
install_path
appdata
-
port
4567
-
startup_name
mrec
Targets
-
-
Target
195928ce3054739020a7985c9ac1d652382da4df5dbfab8b46979a07989b16c7.vbs
-
Size
10KB
-
MD5
045d8d61f86f0d65f12f5c86c5ae2239
-
SHA1
24d19c6daf69f931cf0d87400057ba48ac720c73
-
SHA256
195928ce3054739020a7985c9ac1d652382da4df5dbfab8b46979a07989b16c7
-
SHA512
5709553a258cfb3ea4a355513a8217a539360e79f0db852d5639d327bf02a2901ac8955ecb2633be3d955cdecaf94e7ed949a9d165f87e734a82c9605c920cbf
-
SSDEEP
96:PXVr+kLYdhQg41LcGo5z05lj1iJYaaWK15xgIl5oR8y70zPwP9j9py1evpMr0sIC:PlVg4aUiyPxhoR8y7AOFA0sIogiXIW
-
Detect XenoRat Payload
-
Xenorat family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-