General
-
Target
eulen.exe
-
Size
74KB
-
Sample
250117-28l6aawraj
-
MD5
3844571d2d25e1112db4d525422f8ad2
-
SHA1
3ee0f8874270f73c417a2a56e506a49b850cef8e
-
SHA256
c4c21224b91351cbd943ca77e14c1c458815104ab9ffa5d252615d75e736f725
-
SHA512
fd0ac668e7f85b5bba70bc01db2ae4c63b85519ad8059aaec4142be92ea4642d242fc6fea4fc78bc4cf36b1b67ec4e4564c8effaab6987042acb738187179705
-
SSDEEP
1536:Tw+jjgn2yH9XqcnW85SbTBqWIy8+Qlr6SYCmQqy15X:Tw+jq2s91UbTBqH+Q4wqy15X
Malware Config
Extracted
xenorat
147.185.221.25
Eulen
-
delay
1
-
install_path
temp
-
port
18889
-
startup_name
Update
Targets
-
-
Target
eulen.exe
-
Size
74KB
-
MD5
3844571d2d25e1112db4d525422f8ad2
-
SHA1
3ee0f8874270f73c417a2a56e506a49b850cef8e
-
SHA256
c4c21224b91351cbd943ca77e14c1c458815104ab9ffa5d252615d75e736f725
-
SHA512
fd0ac668e7f85b5bba70bc01db2ae4c63b85519ad8059aaec4142be92ea4642d242fc6fea4fc78bc4cf36b1b67ec4e4564c8effaab6987042acb738187179705
-
SSDEEP
1536:Tw+jjgn2yH9XqcnW85SbTBqWIy8+Qlr6SYCmQqy15X:Tw+jq2s91UbTBqH+Q4wqy15X
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-