General
-
Target
setup.exe
-
Size
45KB
-
Sample
250401-n2ynvaysaw
-
MD5
b377774f8413ba12b5a219c8cdfaa6cc
-
SHA1
d8a032bfdc48ce26f6251ea03e5d231fdc705037
-
SHA256
7957c29721571c011f471853a3a8033f4af0c14c724492e87ccfeefa06aebfa2
-
SHA512
b3f7f1c762217811883383d5ad659f0e41f74ce0055b64e3b5c2c38cf507dac2572e1f0e9deb1511dd8b1b2376e1b4bf8700c5622ad5824a93c9f50cc579b153
-
SSDEEP
768:MMdhO/poiiUcjlJInXFH9Xqk5nWEZ5SbTDavWI7CPW53b:5w+jjgnVH9XqcnW85SbTGWIfb
Malware Config
Extracted
xenorat
78.56.45.239
REPO_57638
-
delay
5000
-
install_path
appdata
-
port
1488
-
startup_name
REPO
Targets
-
-
Target
setup.exe
-
Size
45KB
-
MD5
b377774f8413ba12b5a219c8cdfaa6cc
-
SHA1
d8a032bfdc48ce26f6251ea03e5d231fdc705037
-
SHA256
7957c29721571c011f471853a3a8033f4af0c14c724492e87ccfeefa06aebfa2
-
SHA512
b3f7f1c762217811883383d5ad659f0e41f74ce0055b64e3b5c2c38cf507dac2572e1f0e9deb1511dd8b1b2376e1b4bf8700c5622ad5824a93c9f50cc579b153
-
SSDEEP
768:MMdhO/poiiUcjlJInXFH9Xqk5nWEZ5SbTDavWI7CPW53b:5w+jjgnVH9XqcnW85SbTGWIfb
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-