General
-
Target
a43b59c54921c6b5cc272e0af9917b5973231de9b6d183be381c1820416ce49f.lnk
-
Size
2KB
-
Sample
241210-dsgzmasjay
-
MD5
e03e7eeb288c1f96bb336fe0bfa4cb95
-
SHA1
e2a53c23480aad659723ee5c8542105955787ac1
-
SHA256
a43b59c54921c6b5cc272e0af9917b5973231de9b6d183be381c1820416ce49f
-
SHA512
c142377b9ad169f06e62836c4152b916bfff5b4d64487005fcca5dc2d213a9aeaa5a8d6d2fcfbbbbc13b6016aaf9c4ff0b108cff3af98d28cc85d1502478ce2a
Static task
static1
Behavioral task
behavioral1
Sample
a43b59c54921c6b5cc272e0af9917b5973231de9b6d183be381c1820416ce49f.lnk
Resource
win7-20240903-en
Malware Config
Extracted
https://www.stipamana.com/vbsznjgzfzgolnzdgh/tydthcgfhjdfhsfghxffsjhx/vbfdhydjyfjfxhgjhxgh/pafdfgzdf.vbs
Extracted
xenorat
dns.stipamana.com
Xeno_rat_nd8912d
-
delay
12000
-
install_path
appdata
-
port
4567
-
startup_name
mrec
Targets
-
-
Target
a43b59c54921c6b5cc272e0af9917b5973231de9b6d183be381c1820416ce49f.lnk
-
Size
2KB
-
MD5
e03e7eeb288c1f96bb336fe0bfa4cb95
-
SHA1
e2a53c23480aad659723ee5c8542105955787ac1
-
SHA256
a43b59c54921c6b5cc272e0af9917b5973231de9b6d183be381c1820416ce49f
-
SHA512
c142377b9ad169f06e62836c4152b916bfff5b4d64487005fcca5dc2d213a9aeaa5a8d6d2fcfbbbbc13b6016aaf9c4ff0b108cff3af98d28cc85d1502478ce2a
-
Detect XenoRat Payload
-
Xenorat family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-