General
-
Target
f.exe
-
Size
45KB
-
Sample
250105-rll7nawpb1
-
MD5
2ac2b9c31f795821a2f34fce2b970847
-
SHA1
e9e3d2b81ea332a239b991419b1bba217d90a193
-
SHA256
b92a24260069cde203adae6e90e2b060756694bd9556c06c03a6288dde3c8509
-
SHA512
eac4a062449b5f2f58e56b1c46c331cf950d96ce0805388556c7bc3cc26ae9f550b34d9b3858f0be3de672a5623b019af1d6364a8d99c9e7366d157afcbff037
-
SSDEEP
768:5dhO/poiiUcjlJIn7JH9Xqk5nWEZ5SbTDa6WI7CPW5P:3w+jjgnFH9XqcnW85SbTTWI3
Behavioral task
behavioral1
Sample
f.exe
Resource
win7-20240729-en
Malware Config
Extracted
xenorat
192.168.1.145
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
4684
-
startup_name
Efi spoofer auto spoof
Targets
-
-
Target
f.exe
-
Size
45KB
-
MD5
2ac2b9c31f795821a2f34fce2b970847
-
SHA1
e9e3d2b81ea332a239b991419b1bba217d90a193
-
SHA256
b92a24260069cde203adae6e90e2b060756694bd9556c06c03a6288dde3c8509
-
SHA512
eac4a062449b5f2f58e56b1c46c331cf950d96ce0805388556c7bc3cc26ae9f550b34d9b3858f0be3de672a5623b019af1d6364a8d99c9e7366d157afcbff037
-
SSDEEP
768:5dhO/poiiUcjlJIn7JH9Xqk5nWEZ5SbTDa6WI7CPW5P:3w+jjgnFH9XqcnW85SbTTWI3
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-