General
-
Target
loader.exe
-
Size
45KB
-
Sample
241223-n946layrb1
-
MD5
9bcea0087c56e3d6ae3b40332c44e6cd
-
SHA1
61cc52ec9d192706016b0eb2ebe8da3ccee490a7
-
SHA256
ff6e1d9f0fe45d9fe3dc7af141d59f9cfbf17be078882fb5871395033e3200ed
-
SHA512
a4cfa4d5fc8cbef0e7d4b933daea0a45af5ab9945ec41c5e63236cfd7e07be78700281945ed2aaabd1cccbab165a8c103c2ede22a08492fd309fbce1562a6672
-
SSDEEP
768:6dhO/poiiUcjlJIn63H9Xqk5nWEZ5SbTDatuI7CPW5z:cw+jjgnkH9XqcnW85SbTYuIL
Malware Config
Extracted
xenorat
127.0.0.1
Loader
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
loader
Targets
-
-
Target
loader.exe
-
Size
45KB
-
MD5
9bcea0087c56e3d6ae3b40332c44e6cd
-
SHA1
61cc52ec9d192706016b0eb2ebe8da3ccee490a7
-
SHA256
ff6e1d9f0fe45d9fe3dc7af141d59f9cfbf17be078882fb5871395033e3200ed
-
SHA512
a4cfa4d5fc8cbef0e7d4b933daea0a45af5ab9945ec41c5e63236cfd7e07be78700281945ed2aaabd1cccbab165a8c103c2ede22a08492fd309fbce1562a6672
-
SSDEEP
768:6dhO/poiiUcjlJIn63H9Xqk5nWEZ5SbTDatuI7CPW5z:cw+jjgnkH9XqcnW85SbTYuIL
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-