General
-
Target
ERGERTFEWRFDGFDGFDG.exe
-
Size
45KB
-
Sample
250108-wmv86sxmh1
-
MD5
b1bc8b22449fdc25cd2584fc11230a0c
-
SHA1
3a7abceba9739746a0b6a8dbde462a5db722fbb9
-
SHA256
407c998c5afccd006402d4aa5476f01b061770a09bbceda6ada3a3d2871b4a2c
-
SHA512
deedc85021c7dc49002856918af11a2fb07b8ca5199bed05538c6a4794e9562aed7caf5db35a761fe1e347c15425aea4c6ed41291c26766837145c1583e25a5e
-
SSDEEP
768:tdhO/poiiUcjlJInTzH9Xqk5nWEZ5SbTDaXWI7CPW5V:jw+jjgnfH9XqcnW85SbT+WId
Behavioral task
behavioral1
Sample
ERGERTFEWRFDGFDGFDG.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
82.77.245.93
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
8888
-
startup_name
Widows
Targets
-
-
Target
ERGERTFEWRFDGFDGFDG.exe
-
Size
45KB
-
MD5
b1bc8b22449fdc25cd2584fc11230a0c
-
SHA1
3a7abceba9739746a0b6a8dbde462a5db722fbb9
-
SHA256
407c998c5afccd006402d4aa5476f01b061770a09bbceda6ada3a3d2871b4a2c
-
SHA512
deedc85021c7dc49002856918af11a2fb07b8ca5199bed05538c6a4794e9562aed7caf5db35a761fe1e347c15425aea4c6ed41291c26766837145c1583e25a5e
-
SSDEEP
768:tdhO/poiiUcjlJInTzH9Xqk5nWEZ5SbTDaXWI7CPW5V:jw+jjgnfH9XqcnW85SbT+WId
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-