General
-
Target
BootstrapperNew1.exe
-
Size
50KB
-
Sample
250216-b3bt9awjfs
-
MD5
2db839a013bb2742e80cdcf4edc63f39
-
SHA1
8b94a91e13f1ff30a3ca2627d3b43affacbb66b0
-
SHA256
47497f110de244113679de02a3eefc50a9831c13e7c86b45ea3e0ce8d0072f7d
-
SHA512
3f0210b4a1245d67c96f563a191b4c11455137afee436ec2b41d2b672a93aed4ebeb5ac0814217ef9fc3c1706c371028670583876d829bccc244206af34e324a
-
SSDEEP
768:UdhO/poiiUcjlJIn8aH9Xqk5nWEZ5SbTDaCuI7CPW5ispt:uw+jjgnfH9XqcnW85SbTvuIqspt
Behavioral task
behavioral1
Sample
BootstrapperNew1.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral2
Sample
BootstrapperNew1.exe
Resource
win10ltsc2021-20250207-en
Malware Config
Extracted
xenorat
193.161.193.99
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
Solara Bootstrapper Dependinces
Targets
-
-
Target
BootstrapperNew1.exe
-
Size
50KB
-
MD5
2db839a013bb2742e80cdcf4edc63f39
-
SHA1
8b94a91e13f1ff30a3ca2627d3b43affacbb66b0
-
SHA256
47497f110de244113679de02a3eefc50a9831c13e7c86b45ea3e0ce8d0072f7d
-
SHA512
3f0210b4a1245d67c96f563a191b4c11455137afee436ec2b41d2b672a93aed4ebeb5ac0814217ef9fc3c1706c371028670583876d829bccc244206af34e324a
-
SSDEEP
768:UdhO/poiiUcjlJIn8aH9Xqk5nWEZ5SbTDaCuI7CPW5ispt:uw+jjgnfH9XqcnW85SbTvuIqspt
-
Detect XenoRat Payload
-
Xenorat family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-