General
-
Target
ihatethis.exe
-
Size
45KB
-
Sample
250324-xt7ffst1et
-
MD5
089061cdccbb913beba3304f3bb94bb8
-
SHA1
4874e568837c790facf5a8b74588b2cd622057fc
-
SHA256
5ae2da62c2ee0366328193100323a692e6560c469ce54a280ae81c98e7f21bbd
-
SHA512
3ac8460510cc64632ff193671e677fd1a9bad31c9dae3006028550b2ffadcd86d143b84b3c1a259bb5f694a7d8b99420b975fa62390151c0ab6281fe2d50b3a0
-
SSDEEP
768:3dhO/poiiUcjlJInG0H9Xqk5nWEZ5SbTDaBuI7CPW5t:tw+jjgnLH9XqcnW85SbTsuI1
Behavioral task
behavioral1
Sample
ihatethis.exe
Resource
win7-20241010-en
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
5000
-
startup_name
Copilot
Targets
-
-
Target
ihatethis.exe
-
Size
45KB
-
MD5
089061cdccbb913beba3304f3bb94bb8
-
SHA1
4874e568837c790facf5a8b74588b2cd622057fc
-
SHA256
5ae2da62c2ee0366328193100323a692e6560c469ce54a280ae81c98e7f21bbd
-
SHA512
3ac8460510cc64632ff193671e677fd1a9bad31c9dae3006028550b2ffadcd86d143b84b3c1a259bb5f694a7d8b99420b975fa62390151c0ab6281fe2d50b3a0
-
SSDEEP
768:3dhO/poiiUcjlJInG0H9Xqk5nWEZ5SbTDaBuI7CPW5t:tw+jjgnLH9XqcnW85SbTsuI1
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-