General
-
Target
680632686012cf732ac1fa640bc675528bfac38cfaf4415be9c8c6f58e1e161f
-
Size
2.7MB
-
Sample
250331-vr6d9styfz
-
MD5
f1085213dc1d53f8edb91623227ea124
-
SHA1
826452b193956372738c0cacac7a04b6fe728bfd
-
SHA256
680632686012cf732ac1fa640bc675528bfac38cfaf4415be9c8c6f58e1e161f
-
SHA512
72fcb542d964a1aa32a98a44b54efa979ff5bf30df47e5e8a7551d0651a0fb5956f471d0934a390366c5f431377220e89e0abecb69e51e20abfbbac6fcb3ed12
-
SSDEEP
49152:cDjlabwz9YogON/vfolSuInvHco9SkPyduk/LXgKXEDsAu3echFz2u5/:cqwdgOulSuIn0o9SkPydxLXZXHechFCE
Static task
static1
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
680632686012cf732ac1fa640bc675528bfac38cfaf4415be9c8c6f58e1e161f
-
Size
2.7MB
-
MD5
f1085213dc1d53f8edb91623227ea124
-
SHA1
826452b193956372738c0cacac7a04b6fe728bfd
-
SHA256
680632686012cf732ac1fa640bc675528bfac38cfaf4415be9c8c6f58e1e161f
-
SHA512
72fcb542d964a1aa32a98a44b54efa979ff5bf30df47e5e8a7551d0651a0fb5956f471d0934a390366c5f431377220e89e0abecb69e51e20abfbbac6fcb3ed12
-
SSDEEP
49152:cDjlabwz9YogON/vfolSuInvHco9SkPyduk/LXgKXEDsAu3echFz2u5/:cqwdgOulSuIn0o9SkPydxLXZXHechFCE
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-