General
-
Target
Client.exe
-
Size
112KB
-
Sample
250402-wy8cwa1xdt
-
MD5
53abc47921f3af6d9cfac59b5e272c36
-
SHA1
808dc707df535523605bf4f917161f23f0307782
-
SHA256
ac542f56167f262766ff228daaa27f96f18fdf0c931e7fb9640d4d51f5b093df
-
SHA512
5595b7a3cafb527f9f5b4263df98e29167f9461016d22acdb8654124d3adf345305218242c3feec7c87de3de486f485969fe3b3b2065ac376fb6ed5a5e55170d
-
SSDEEP
768:NdhO/poiiUcjlJInu7ElmH9Xqk5nWEZ5SbTDawuI7CPW5aZLKEe+eJaS:Dw+jjgnmElmH9XqcnW85SbT9uIyZzS
Malware Config
Extracted
xenorat
178.83.80.11
WinStart
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
WinStart
Targets
-
-
Target
Client.exe
-
Size
112KB
-
MD5
53abc47921f3af6d9cfac59b5e272c36
-
SHA1
808dc707df535523605bf4f917161f23f0307782
-
SHA256
ac542f56167f262766ff228daaa27f96f18fdf0c931e7fb9640d4d51f5b093df
-
SHA512
5595b7a3cafb527f9f5b4263df98e29167f9461016d22acdb8654124d3adf345305218242c3feec7c87de3de486f485969fe3b3b2065ac376fb6ed5a5e55170d
-
SSDEEP
768:NdhO/poiiUcjlJInu7ElmH9Xqk5nWEZ5SbTDawuI7CPW5aZLKEe+eJaS:Dw+jjgnmElmH9XqcnW85SbT9uIyZzS
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-