General
-
Target
serrteter.exe
-
Size
45KB
-
Sample
241218-vy523sxker
-
MD5
369a6ea15eb8ebde64fc1e043ad44382
-
SHA1
7f45dbf3268ec3bbfdd06c2086294b26d9beebac
-
SHA256
b543df56136a5f5cab011ce1d88dd866aa47578c37bf5edab19db2c3d8c4e771
-
SHA512
d88c224419abefae5da3ea3cb4b479c1bd1063a70ad3659d138886e194aca5a82e124e6dc74e108501fbbb0cdcd58c0bf9f8b53330e00a7bc74e978f1ac58533
-
SSDEEP
768:FdhO/poiiUcjlJInazH9Xqk5nWEZ5SbTDa+WI7CPW5N:bw+jjgnYH9XqcnW85SbTPWIF
Behavioral task
behavioral1
Sample
serrteter.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
serrteter.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
serrteter.exe
Resource
android-x64-20240624-en
Malware Config
Extracted
xenorat
0.0.0.0
Xeno_rat_nd8912d
-
delay
1
-
install_path
appdata
-
port
8888
-
startup_name
Windows
Targets
-
-
Target
serrteter.exe
-
Size
45KB
-
MD5
369a6ea15eb8ebde64fc1e043ad44382
-
SHA1
7f45dbf3268ec3bbfdd06c2086294b26d9beebac
-
SHA256
b543df56136a5f5cab011ce1d88dd866aa47578c37bf5edab19db2c3d8c4e771
-
SHA512
d88c224419abefae5da3ea3cb4b479c1bd1063a70ad3659d138886e194aca5a82e124e6dc74e108501fbbb0cdcd58c0bf9f8b53330e00a7bc74e978f1ac58533
-
SSDEEP
768:FdhO/poiiUcjlJInazH9Xqk5nWEZ5SbTDa+WI7CPW5N:bw+jjgnYH9XqcnW85SbTPWIF
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-