General
-
Target
ea254e085f81b5d580391f4fab6ce4c462cd66485e7ef42a49f9f12ab158a362.lnk
-
Size
2KB
-
Sample
241210-eeh57ssrcv
-
MD5
17af012abc0e526f7d02932f5a39d9db
-
SHA1
5df75915751923ef2ec5226e129b5107ec5ee56a
-
SHA256
ea254e085f81b5d580391f4fab6ce4c462cd66485e7ef42a49f9f12ab158a362
-
SHA512
af0fd0d4be8f3db60f122e37d1fe34ff0aeb066205b83aa13c128d0c3c4828651dee9774c9ef0413ae8f3eb65fa62f54054f830ee4aae33a07206086859a5c83
Static task
static1
Behavioral task
behavioral1
Sample
ea254e085f81b5d580391f4fab6ce4c462cd66485e7ef42a49f9f12ab158a362.lnk
Resource
win7-20241023-en
Malware Config
Extracted
https://www.stipamana.com/vbsznjgzfzgolnzdgh/tydthcgfhjdfhsfghxffsjhx/vbfdhydjyfjfxhgjhxgh/pafdfgzdf.vbs
Extracted
xenorat
dns.stipamana.com
Xeno_rat_nd8912d
-
delay
12000
-
install_path
appdata
-
port
4567
-
startup_name
mrec
Targets
-
-
Target
ea254e085f81b5d580391f4fab6ce4c462cd66485e7ef42a49f9f12ab158a362.lnk
-
Size
2KB
-
MD5
17af012abc0e526f7d02932f5a39d9db
-
SHA1
5df75915751923ef2ec5226e129b5107ec5ee56a
-
SHA256
ea254e085f81b5d580391f4fab6ce4c462cd66485e7ef42a49f9f12ab158a362
-
SHA512
af0fd0d4be8f3db60f122e37d1fe34ff0aeb066205b83aa13c128d0c3c4828651dee9774c9ef0413ae8f3eb65fa62f54054f830ee4aae33a07206086859a5c83
-
Detect XenoRat Payload
-
Xenorat family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-