General
-
Target
wave.exe
-
Size
121KB
-
Sample
250115-wgfars1qdj
-
MD5
0c8d27584306ac7ca56b6642847c83f1
-
SHA1
a5be54c39b1ee1a173f0b78966b52de9f661c715
-
SHA256
803396bb833dd85a4a5b4910b448442f8c78496d81d77117cf4b534c35b9967c
-
SHA512
1628197016ba08acd9ace409eb0e8afc579ea7a9b22268fc56520a34383288edd68ab00e36ee4030de39f255b12d47c1512575c79cb7da8168c7fe5e0c280831
-
SSDEEP
3072:tw+jqm91UbTKXqeCHHoaqyfiFKDt+CS4fVX3Lwa4:aWP91UbMCoEfiFKZ+CS6Lwa
Behavioral task
behavioral1
Sample
wave.exe
Resource
win7-20241010-en
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
7276
-
startup_name
wave
Targets
-
-
Target
wave.exe
-
Size
121KB
-
MD5
0c8d27584306ac7ca56b6642847c83f1
-
SHA1
a5be54c39b1ee1a173f0b78966b52de9f661c715
-
SHA256
803396bb833dd85a4a5b4910b448442f8c78496d81d77117cf4b534c35b9967c
-
SHA512
1628197016ba08acd9ace409eb0e8afc579ea7a9b22268fc56520a34383288edd68ab00e36ee4030de39f255b12d47c1512575c79cb7da8168c7fe5e0c280831
-
SSDEEP
3072:tw+jqm91UbTKXqeCHHoaqyfiFKDt+CS4fVX3Lwa4:aWP91UbMCoEfiFKZ+CS6Lwa
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-