General
-
Target
eulen.exe
-
Size
45KB
-
Sample
250117-2z8ypavrf1
-
MD5
5a27794bcc19355cd3bf7b2c1be74390
-
SHA1
513786fdca0daa216233a6ca0a76f5e3eb091e8b
-
SHA256
5ddc9bb25c94d9a41c1c2faaa25f345fe742a9d915326dd028082fbefb1929f9
-
SHA512
694553f6c0310351248323e076d69599a89e996b3977d6f8b253128419c750008609c3b4164c72a686854cbc9232a5655394e394843be77b584238d6373b1cd1
-
SSDEEP
768:WdhO/poiiUcjlJInJ4yH9Xqk5nWEZ5SbTDaqqWI7CPW5t:Aw+jjgneyH9XqcnW85SbTBqWIl
Malware Config
Extracted
xenorat
147.185.221.25
Eulen
-
delay
5000
-
install_path
temp
-
port
18889
-
startup_name
Update
Targets
-
-
Target
eulen.exe
-
Size
45KB
-
MD5
5a27794bcc19355cd3bf7b2c1be74390
-
SHA1
513786fdca0daa216233a6ca0a76f5e3eb091e8b
-
SHA256
5ddc9bb25c94d9a41c1c2faaa25f345fe742a9d915326dd028082fbefb1929f9
-
SHA512
694553f6c0310351248323e076d69599a89e996b3977d6f8b253128419c750008609c3b4164c72a686854cbc9232a5655394e394843be77b584238d6373b1cd1
-
SSDEEP
768:WdhO/poiiUcjlJInJ4yH9Xqk5nWEZ5SbTDaqqWI7CPW5t:Aw+jjgneyH9XqcnW85SbTBqWIl
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-