General
-
Target
05692e7735450069cc9e0c78bb80514c312d40ef47efbbbaae701a624fbabfba.lnk
-
Size
2KB
-
Sample
241210-cjx4tavlhq
-
MD5
cfd668a55ea2ee344f5a9badb6ff18b7
-
SHA1
b3927747076a408a9e73afa0df3a6adadcbae950
-
SHA256
05692e7735450069cc9e0c78bb80514c312d40ef47efbbbaae701a624fbabfba
-
SHA512
e8976004a15afced95af6a14e0c8360be13014dffdcac71aff24964036318b9cec958ce87db71dfec79f88944367ed7c6beb0b6ba8187f7329d44b55fc3fa943
Static task
static1
Behavioral task
behavioral1
Sample
05692e7735450069cc9e0c78bb80514c312d40ef47efbbbaae701a624fbabfba.lnk
Resource
win7-20240903-en
Malware Config
Extracted
https://www.stipamana.com/vbsznjgzfzgolnzdgh/tydthcgfhjdfhsfghxffsjhx/vbfdhydjyfjfxhgjhxgh/pafdfgzdf.vbs
Extracted
xenorat
dns.stipamana.com
Xeno_rat_nd8912d
-
delay
12000
-
install_path
appdata
-
port
4567
-
startup_name
mrec
Targets
-
-
Target
05692e7735450069cc9e0c78bb80514c312d40ef47efbbbaae701a624fbabfba.lnk
-
Size
2KB
-
MD5
cfd668a55ea2ee344f5a9badb6ff18b7
-
SHA1
b3927747076a408a9e73afa0df3a6adadcbae950
-
SHA256
05692e7735450069cc9e0c78bb80514c312d40ef47efbbbaae701a624fbabfba
-
SHA512
e8976004a15afced95af6a14e0c8360be13014dffdcac71aff24964036318b9cec958ce87db71dfec79f88944367ed7c6beb0b6ba8187f7329d44b55fc3fa943
-
Detect XenoRat Payload
-
Xenorat family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-