General
-
Target
7cc5e330c3c53f76341b2901bb1f48a32a0d0b4a897d1bc33925270696f40bce.exe
-
Size
211KB
-
Sample
250104-dwba9aylh1
-
MD5
6fb46f2f43c2cca4250c3acf5254b827
-
SHA1
8967e19260d8638a0afb7171d917ad7b70df0900
-
SHA256
7cc5e330c3c53f76341b2901bb1f48a32a0d0b4a897d1bc33925270696f40bce
-
SHA512
24565194f406feb006e53905523ab6193f244ee627f9c5b5c98459018cef9213cb9566d269e98f30bb1c93fa34e339c8deca96ff76be14ad37b6398e96bc1502
-
SSDEEP
3072:Ew+jqFlFfG91UbT7CgZGWJk5ArMtnoLTL8k8xhX:NWmG91UbSg8WJkxWL8N
Behavioral task
behavioral1
Sample
7cc5e330c3c53f76341b2901bb1f48a32a0d0b4a897d1bc33925270696f40bce.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
64.52.80.67
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
SnapHack
Targets
-
-
Target
7cc5e330c3c53f76341b2901bb1f48a32a0d0b4a897d1bc33925270696f40bce.exe
-
Size
211KB
-
MD5
6fb46f2f43c2cca4250c3acf5254b827
-
SHA1
8967e19260d8638a0afb7171d917ad7b70df0900
-
SHA256
7cc5e330c3c53f76341b2901bb1f48a32a0d0b4a897d1bc33925270696f40bce
-
SHA512
24565194f406feb006e53905523ab6193f244ee627f9c5b5c98459018cef9213cb9566d269e98f30bb1c93fa34e339c8deca96ff76be14ad37b6398e96bc1502
-
SSDEEP
3072:Ew+jqFlFfG91UbT7CgZGWJk5ArMtnoLTL8k8xhX:NWmG91UbSg8WJkxWL8N
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-