General
-
Target
eulenreal.exe
-
Size
74KB
-
Sample
250117-24pevawpfq
-
MD5
507b3e8756680aa9eb98924d2aa13434
-
SHA1
137d3cdcfe15f23df7458ac47363fd7f186d807c
-
SHA256
f369cdebe099937c116c8768d9764902a2a47d36e94504182b1e86c7cde7a135
-
SHA512
e9f64908ba4e3c9bd589f5e10da3b4010ea18685e81b4f40cdaa74ef79f486da0546dee1900f5aa5ff3cafd4a9a195813cb664927aeb5700a5823a1cbefe6ff9
-
SSDEEP
1536:ow+jjgntH9XqcnW85SbT8quIu8+Qlr6SYCmQqy15X:ow+jq191UbT8qD+Q4wqy15X
Malware Config
Extracted
xenorat
127.0.0.1
Eulen
-
delay
1
-
install_path
temp
-
port
18889
-
startup_name
Update
Targets
-
-
Target
eulenreal.exe
-
Size
74KB
-
MD5
507b3e8756680aa9eb98924d2aa13434
-
SHA1
137d3cdcfe15f23df7458ac47363fd7f186d807c
-
SHA256
f369cdebe099937c116c8768d9764902a2a47d36e94504182b1e86c7cde7a135
-
SHA512
e9f64908ba4e3c9bd589f5e10da3b4010ea18685e81b4f40cdaa74ef79f486da0546dee1900f5aa5ff3cafd4a9a195813cb664927aeb5700a5823a1cbefe6ff9
-
SSDEEP
1536:ow+jjgntH9XqcnW85SbT8quIu8+Qlr6SYCmQqy15X:ow+jq191UbT8qD+Q4wqy15X
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-