General
-
Target
test.exe
-
Size
45KB
-
Sample
250127-ahdbxazrhy
-
MD5
21645270a894666d3b1907b66ddd147f
-
SHA1
bfd5061be263edd2de98d17fb989a408fa7117b9
-
SHA256
567d3d5648344b34020556c6dc5415cb96f4c385c314279c0a26c0ebac58851e
-
SHA512
84ad094f677e06caf4f6a5b552afd9e0420f428e2ce86904340786bdfe979f8f345d72574a0012cc7224caa57fcb355b723ce14e63bd8d808e592cdd9346ec6e
-
SSDEEP
768:tdhO/poiiUcjlJInuzH9Xqk5nWEZ5SbTDa0WI7CPW5/:jw+jjgnsH9XqcnW85SbTNWIX
Behavioral task
behavioral1
Sample
test.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xenorat
24.ip.gl.ply.gg
Xeno_rat_nd8912d
-
delay
3000
-
install_path
appdata
-
port
64438
-
startup_name
cmd
Targets
-
-
Target
test.exe
-
Size
45KB
-
MD5
21645270a894666d3b1907b66ddd147f
-
SHA1
bfd5061be263edd2de98d17fb989a408fa7117b9
-
SHA256
567d3d5648344b34020556c6dc5415cb96f4c385c314279c0a26c0ebac58851e
-
SHA512
84ad094f677e06caf4f6a5b552afd9e0420f428e2ce86904340786bdfe979f8f345d72574a0012cc7224caa57fcb355b723ce14e63bd8d808e592cdd9346ec6e
-
SSDEEP
768:tdhO/poiiUcjlJInuzH9Xqk5nWEZ5SbTDa0WI7CPW5/:jw+jjgnsH9XqcnW85SbTNWIX
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-