General
-
Target
0e944d5857ca770465f9b4372cf3ec39050cef2cad2c3cd63dc01157f840e164
-
Size
45KB
-
Sample
241210-r29mwssrgl
-
MD5
b7c141189db621ece4b6935dd3795495
-
SHA1
159ebbf22f951ab07ec5794aa19ca9440cbd2837
-
SHA256
0e944d5857ca770465f9b4372cf3ec39050cef2cad2c3cd63dc01157f840e164
-
SHA512
1257e345ac1f11bda207da7186a4919da59f10ebad919f6d2a98d62547b4a06eec8c061657fbef522012742b6cf1bfcbd6edee39e0cf4e2e0914fb6bd278d043
-
SSDEEP
768:ddhO/poiiUcjlJInIaH9Xqk5nWEZ5SbTDajuI7CPW5V:Tw+jjgnfH9XqcnW85SbT+uIt
Behavioral task
behavioral1
Sample
0e944d5857ca770465f9b4372cf3ec39050cef2cad2c3cd63dc01157f840e164.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
anonam39-41248.portmap.io
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
41248
-
startup_name
RuntimeBroker
Targets
-
-
Target
0e944d5857ca770465f9b4372cf3ec39050cef2cad2c3cd63dc01157f840e164
-
Size
45KB
-
MD5
b7c141189db621ece4b6935dd3795495
-
SHA1
159ebbf22f951ab07ec5794aa19ca9440cbd2837
-
SHA256
0e944d5857ca770465f9b4372cf3ec39050cef2cad2c3cd63dc01157f840e164
-
SHA512
1257e345ac1f11bda207da7186a4919da59f10ebad919f6d2a98d62547b4a06eec8c061657fbef522012742b6cf1bfcbd6edee39e0cf4e2e0914fb6bd278d043
-
SSDEEP
768:ddhO/poiiUcjlJInIaH9Xqk5nWEZ5SbTDajuI7CPW5V:Tw+jjgnfH9XqcnW85SbT+uIt
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-