General
-
Target
Bootstrapper Test.exe
-
Size
50KB
-
Sample
250216-qxa34azjbv
-
MD5
91185814f6daab193232e538231043b8
-
SHA1
9228f6a0760796d1b91fb42f256c10cd13f88223
-
SHA256
868a09b65998aa4794021e384c19214f9cae84d7d3be857a420dcea324a7c37f
-
SHA512
ab61e525001cec9eb706cb6637a1f1475814a49682e96b7c71515dd98ef8540d6ca6b6506d6d7e1a774345a97c79a9c8fca5673ac580e4108f61a091e07a7111
-
SSDEEP
768:CdhO/poiiUcjlJInPaH9Xqk5nWEZ5SbTDaCuI7CPW5Sspa:kw+jjgniH9XqcnW85SbTvuIqspa
Malware Config
Extracted
xenorat
193.161.193.99
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
1194
-
startup_name
Solara Bootstrapper Dependinces
Targets
-
-
Target
Bootstrapper Test.exe
-
Size
50KB
-
MD5
91185814f6daab193232e538231043b8
-
SHA1
9228f6a0760796d1b91fb42f256c10cd13f88223
-
SHA256
868a09b65998aa4794021e384c19214f9cae84d7d3be857a420dcea324a7c37f
-
SHA512
ab61e525001cec9eb706cb6637a1f1475814a49682e96b7c71515dd98ef8540d6ca6b6506d6d7e1a774345a97c79a9c8fca5673ac580e4108f61a091e07a7111
-
SSDEEP
768:CdhO/poiiUcjlJInPaH9Xqk5nWEZ5SbTDaCuI7CPW5Sspa:kw+jjgniH9XqcnW85SbTvuIqspa
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-