General
-
Target
runner.exe
-
Size
22KB
-
Sample
250404-tpvpbazydx
-
MD5
9a69ca248eb8201fa463914ad24cf890
-
SHA1
52833d514ab20ce3bb2d9a37c07bd93ea0f4f82e
-
SHA256
807f40d1f7f6291184bb95f73a72456aae52a12d665b45b40bf0b664c49ddf06
-
SHA512
29ceb1dfcfaba2e79cbd7867afc053eb054e5c1d68c77f702472018f979f85de3003c02fda9e39e216569b142bb2b09b76f8eaffb7e9926869a6cbb1c714fe76
-
SSDEEP
384:oybnj2M7f7i/ww+/frgeI0/GZ0hYkp1KTdmpasWUOS5BEvNWmkZB20qyM9KzXrQT:z6W/GTY9VI3XB
Static task
static1
Behavioral task
behavioral1
Sample
runner.exe
Resource
win10ltsc2021-20250314-en
Malware Config
Extracted
xenorat
visit-dose.gl.at.ply.gg
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
64494
-
startup_name
Update
Targets
-
-
Target
runner.exe
-
Size
22KB
-
MD5
9a69ca248eb8201fa463914ad24cf890
-
SHA1
52833d514ab20ce3bb2d9a37c07bd93ea0f4f82e
-
SHA256
807f40d1f7f6291184bb95f73a72456aae52a12d665b45b40bf0b664c49ddf06
-
SHA512
29ceb1dfcfaba2e79cbd7867afc053eb054e5c1d68c77f702472018f979f85de3003c02fda9e39e216569b142bb2b09b76f8eaffb7e9926869a6cbb1c714fe76
-
SSDEEP
384:oybnj2M7f7i/ww+/frgeI0/GZ0hYkp1KTdmpasWUOS5BEvNWmkZB20qyM9KzXrQT:z6W/GTY9VI3XB
-
Deletes Windows Defender Definitions
Uses mpcmdrun utility to delete all AV definitions.
-
Detect XenoRat Payload
-
Xenorat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-