General
-
Target
AM1.exe
-
Size
33KB
-
Sample
250103-bgjmzasrdz
-
MD5
38b58ea0e9fc2d5d719afb3267560e21
-
SHA1
da4ab3b765dea42125a0c4386ef02327e6647790
-
SHA256
8f326835e232a7b9ec21e3d09fa0707f806379486ed82acbbfc1538297779021
-
SHA512
f9c7d1df0db50c9c5c79c94397c1ae5b19487a230dab429df1852bbe979514efccc9843bc040804e09efbc64696ca6e0a92b5eb091919a844ad0783f775f68a7
-
SSDEEP
768:KmQZqx1lYcJHNP1hWmkPV+b8me1UMQkSF4dXbOfq1JkFAFta:K0lYUWDPV+bS+Mw45bOlFAFta
Static task
static1
Behavioral task
behavioral1
Sample
AM1.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
AM1.exe
Resource
win11-20241007-en
Malware Config
Extracted
xenorat
127.0.0.1
fivefivefive
-
delay
5000
-
install_path
appdata
-
port
2025
-
startup_name
RuntimeBroker
Targets
-
-
Target
AM1.exe
-
Size
33KB
-
MD5
38b58ea0e9fc2d5d719afb3267560e21
-
SHA1
da4ab3b765dea42125a0c4386ef02327e6647790
-
SHA256
8f326835e232a7b9ec21e3d09fa0707f806379486ed82acbbfc1538297779021
-
SHA512
f9c7d1df0db50c9c5c79c94397c1ae5b19487a230dab429df1852bbe979514efccc9843bc040804e09efbc64696ca6e0a92b5eb091919a844ad0783f775f68a7
-
SSDEEP
768:KmQZqx1lYcJHNP1hWmkPV+b8me1UMQkSF4dXbOfq1JkFAFta:K0lYUWDPV+bS+Mw45bOlFAFta
-
Detect XenoRat Payload
-
Xenorat family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-