General

  • Target

    driverload.exe

  • Size

    45KB

  • MD5

    bdec688b1e69cc82aee4a9e4033a62af

  • SHA1

    32159419140b54455b90f8a0f095692906d81e6d

  • SHA256

    be1aeeccf8149d9a9feb1a2d4d860f75536397194ce440867bc686a454aa1e46

  • SHA512

    51fee0708fe97c8ac05d7e469bccecccb067813105e2ed214947c9353a9473c9a0c898a4fe84ac5fdb23c056110042c31435c59959df5d008d1f797d45192035

  • SSDEEP

    768:2dhO/poiiUcjlJInreH9Xqk5nWEZ5SbTDaMWI7CPW5b:gw+jjgnSH9XqcnW85SbT9WIz

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

bypass

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    4444

  • startup_name

    nothingset

Signatures

  • Xenorat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • driverload.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections