General
-
Target
loader69.exe
-
Size
208KB
-
MD5
469f772a8aa04641c8de438a50d65d25
-
SHA1
ef3fef941abf28a494b6dcbf50c0b42a16ecd8dc
-
SHA256
e68cc5f5b9cdb5283d1300cf720de52d0c1ff1e0289364d15e04ac061e067e8a
-
SHA512
fd6f0c0e02743e9f68958eae9f97b96066d8f72b20480eee3c0c6f472784f144e00ce9cc72c9d7ac8c124b46a234283f668645e27bd98b400c33dbfba81235c9
-
SSDEEP
1536:Pw+jjgnqlF2I8H9XqcnW85SbTkuIia6c:Pw+jqqlFfG91UbTkA9c
Malware Config
Extracted
xenorat
192.168.1.167
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
4567
-
startup_name
Chrome
Signatures
-
Xenorat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource loader69.exe
Files
-
loader69.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ