General
-
Target
EchoLogger.exe
-
Size
5.6MB
-
Sample
240511-xj7y8sfc26
-
MD5
0b1f4455971b59cd0943b78ac80d1f95
-
SHA1
54da81385d5d67bfb925ddd7b5dbf2bae923cce5
-
SHA256
80b98aa859cff943bece9831f7de94656292ff5147db30a9e315ee30553425c2
-
SHA512
5805d67ab91d32d203433a299943bfde35a65945ebb7861b770c4a00a9adfd3938c6c347e7a1eb120de9240edd2452a0b8d1af9664ff0d6f50cbb4e5ed042c5f
-
SSDEEP
98304:Y9r1U+si7I0QgV8uPYo/FrjoYPLCr2P5+yvNAyAkkYgGquVIia2kJb8WG9sE68gB:aSUIsV8uASFrjjW0+aAukqZ24zgRm2u2
Static task
static1
Malware Config
Extracted
xenorat
jctestwindows.airdns.org
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
45010
-
startup_name
ErrorManager
Targets
-
-
Target
EchoLogger.exe
-
Size
5.6MB
-
MD5
0b1f4455971b59cd0943b78ac80d1f95
-
SHA1
54da81385d5d67bfb925ddd7b5dbf2bae923cce5
-
SHA256
80b98aa859cff943bece9831f7de94656292ff5147db30a9e315ee30553425c2
-
SHA512
5805d67ab91d32d203433a299943bfde35a65945ebb7861b770c4a00a9adfd3938c6c347e7a1eb120de9240edd2452a0b8d1af9664ff0d6f50cbb4e5ed042c5f
-
SSDEEP
98304:Y9r1U+si7I0QgV8uPYo/FrjoYPLCr2P5+yvNAyAkkYgGquVIia2kJb8WG9sE68gB:aSUIsV8uASFrjjW0+aAukqZ24zgRm2u2
-
Detect ZGRat V1
-
Executes dropped EXE
-