General
-
Target
3d22fbc11a0a5531c00e71c387d5b181.exe
-
Size
45KB
-
Sample
250214-xp2dmsxjbn
-
MD5
3d22fbc11a0a5531c00e71c387d5b181
-
SHA1
ac0dccbf65b9ecdd419a3f27ed9350374094b430
-
SHA256
3a0e1b05ff6ec86823873c6e0fa0c85c057ce44a41e9b918bc9273dc2266cdee
-
SHA512
a9683aacfc05b2465e14626fa12230b3823bded51015d19f8db5b59828df4f6ffe8d47a7d63a2a5971c17288032df681d83c073aceccc0b62fbd2aae3bfa6c3b
-
SSDEEP
768:edhO/poiiUcjlJInF3EH9Xqk5nWEZ5SbTDaUuI7CPW5V:ow+jjgnREH9XqcnW85SbTBuId
Behavioral task
behavioral1
Sample
3d22fbc11a0a5531c00e71c387d5b181.exe
Resource
win7-20250207-en
Malware Config
Extracted
xenorat
139.99.86.21
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
2003
-
startup_name
nothingset
Targets
-
-
Target
3d22fbc11a0a5531c00e71c387d5b181.exe
-
Size
45KB
-
MD5
3d22fbc11a0a5531c00e71c387d5b181
-
SHA1
ac0dccbf65b9ecdd419a3f27ed9350374094b430
-
SHA256
3a0e1b05ff6ec86823873c6e0fa0c85c057ce44a41e9b918bc9273dc2266cdee
-
SHA512
a9683aacfc05b2465e14626fa12230b3823bded51015d19f8db5b59828df4f6ffe8d47a7d63a2a5971c17288032df681d83c073aceccc0b62fbd2aae3bfa6c3b
-
SSDEEP
768:edhO/poiiUcjlJInF3EH9Xqk5nWEZ5SbTDaUuI7CPW5V:ow+jjgnREH9XqcnW85SbTBuId
-
Detect XenoRat Payload
-
Xenorat family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-