General
-
Target
6fb46f2f43c2cca4250c3acf5254b827.bin
-
Size
93KB
-
Sample
250105-btq8ksymfq
-
MD5
af939035da87da0e8dce80749ba5b5d9
-
SHA1
f129a9c87d577b8a723aed9dc421e7638633fc85
-
SHA256
21994fbd025b35fb8de6341fbc36eb397b96d3a5e179c62f286f17f1ce2c97f6
-
SHA512
5e2a8ade91c58202ad0fa4e9fbafd7f3ec5baa33c949921278e8b6f45474d23016a66d4d4bfc698ca579a332b292634e0a5ec7e8784b5102b860a7f97b58184f
-
SSDEEP
1536:E/nMq43Lykf1dqK2nLRSS0YYQBm+N5V18YMFuoPLjCV4U9MWG7+S2zJsZXPWFeC9:E/Mq4+UrNUR7jX4+jV1sLjCV/947+S4H
Behavioral task
behavioral1
Sample
7cc5e330c3c53f76341b2901bb1f48a32a0d0b4a897d1bc33925270696f40bce.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
64.52.80.67
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
SnapHack
Targets
-
-
Target
7cc5e330c3c53f76341b2901bb1f48a32a0d0b4a897d1bc33925270696f40bce.exe
-
Size
211KB
-
MD5
6fb46f2f43c2cca4250c3acf5254b827
-
SHA1
8967e19260d8638a0afb7171d917ad7b70df0900
-
SHA256
7cc5e330c3c53f76341b2901bb1f48a32a0d0b4a897d1bc33925270696f40bce
-
SHA512
24565194f406feb006e53905523ab6193f244ee627f9c5b5c98459018cef9213cb9566d269e98f30bb1c93fa34e339c8deca96ff76be14ad37b6398e96bc1502
-
SSDEEP
3072:Ew+jqFlFfG91UbT7CgZGWJk5ArMtnoLTL8k8xhX:NWmG91UbSg8WJkxWL8N
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-