General
-
Target
rzsneo_xp2k.exe
-
Size
2.7MB
-
Sample
250303-v7z77atyaw
-
MD5
d8a38fb9a5c0295825c0b4d46f32324c
-
SHA1
f3e32410b83e93ecbcbd829a4bd0a360c7449cea
-
SHA256
3f539cd170926f163d3edd57e673097a83d5bced26009b62ba32af5a36da2b60
-
SHA512
5d9fbc3f8ddd691d7af764274bc41f490dc088b0409beb0fcb8cbec21c026b0ad3c3af93aab8be5dfcefd4602cd68b22efcd1e8abac2ce3e3f447ec0847d4ab0
-
SSDEEP
49152:tyMJcNGc6/FPnVtlR785IGBKqQiNUeblQPw3QOcmWb7vAGfJ9tJBoaI3Hzz45uJ:gYcN9sltRqRUebmEhgZDpI3n5
Static task
static1
Behavioral task
behavioral1
Sample
rzsneo_xp2k.exe
Resource
win7-20250207-en
Malware Config
Targets
-
-
Target
rzsneo_xp2k.exe
-
Size
2.7MB
-
MD5
d8a38fb9a5c0295825c0b4d46f32324c
-
SHA1
f3e32410b83e93ecbcbd829a4bd0a360c7449cea
-
SHA256
3f539cd170926f163d3edd57e673097a83d5bced26009b62ba32af5a36da2b60
-
SHA512
5d9fbc3f8ddd691d7af764274bc41f490dc088b0409beb0fcb8cbec21c026b0ad3c3af93aab8be5dfcefd4602cd68b22efcd1e8abac2ce3e3f447ec0847d4ab0
-
SSDEEP
49152:tyMJcNGc6/FPnVtlR785IGBKqQiNUeblQPw3QOcmWb7vAGfJ9tJBoaI3Hzz45uJ:gYcN9sltRqRUebmEhgZDpI3n5
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Venomrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-