General

  • Target

    OHIO.exe

  • Size

    45KB

  • MD5

    204bbef87179ce538967d0a2deeaf1f1

  • SHA1

    ded1fd9dbe871303791abfab7868ec7c08e693dc

  • SHA256

    726846fbb5d59c18d5dac5030922dd48dd2a5c7f2c3f5d588cf390f7b854aa99

  • SHA512

    fac8562234b5a62946c77fffb0b2e7f6c9d54d76476a825cafae9b387b72e477b378a0999235b0acefb7bb1aceed62584a8d8883d2a4046be411a829b99fac0d

  • SSDEEP

    768:TdhO/poiiUcjlJInp2gH9Xqk5nWEZ5SbTDaXuI7CPW5I:hw+jjgnpLH9XqcnW85SbT6uIA

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    4444

  • startup_name

    Windows Protection

Signatures

  • Xenorat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • OHIO.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections