General
-
Target
skidiponly.exe
-
Size
46KB
-
Sample
250331-tea7xswjw5
-
MD5
aefa96ed190a866e6a3cb1d80c68d497
-
SHA1
e8449d566506e6c153d536cff3e444e73403d4ce
-
SHA256
ac7797b246bfd72068e3cb41f7a9b7db3275a2791969626198f323434fbb0f84
-
SHA512
e2a8ba27a0b1972b513caee831bcd5175f6407a3cdc6d061782049a608f3ed2c457b0b914589967bbd6e37f06173f5cf1bf735e032d882e47287e4d1f92b38e0
-
SSDEEP
768:cdhO/poiiUcjlJInXJH9Xqk5nWEZ5SbTDaJWI7CPW5p:Ww+jjgnZH9XqcnW85SbTwWIR
Malware Config
Extracted
xenorat
193.161.193.99
skid_nigger@skid_C2
-
delay
5000
-
install_path
appdata
-
port
20192
-
startup_name
Windows Updater
Targets
-
-
Target
skidiponly.exe
-
Size
46KB
-
MD5
aefa96ed190a866e6a3cb1d80c68d497
-
SHA1
e8449d566506e6c153d536cff3e444e73403d4ce
-
SHA256
ac7797b246bfd72068e3cb41f7a9b7db3275a2791969626198f323434fbb0f84
-
SHA512
e2a8ba27a0b1972b513caee831bcd5175f6407a3cdc6d061782049a608f3ed2c457b0b914589967bbd6e37f06173f5cf1bf735e032d882e47287e4d1f92b38e0
-
SSDEEP
768:cdhO/poiiUcjlJInXJH9Xqk5nWEZ5SbTDaJWI7CPW5p:Ww+jjgnZH9XqcnW85SbTwWIR
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-