General
-
Target
123.exe
-
Size
45KB
-
Sample
240513-xjvnxahf8v
-
MD5
fd3fa42906bc5b6a8c5e797431d3e9f1
-
SHA1
8f21e90966b9682640ae12d89b7485f18fc960c5
-
SHA256
8a9c7963d74a81dbbdd82f50e0ef9014777474c9ff55bc26bbf64681bb571cfb
-
SHA512
b04e17457c28d791717751626f3e88872fc4c4792e6da90d8e008817afc6c3b7ef8bd2afc09ecd0c951d74f8d2922d1eaa190ae3c3d166dd6cf93338c70947a1
-
SSDEEP
768:BdhO/poiiUcjlJInLr6BH9Xqk5nWEZ5SbTDaUuI7CPW5Q:/w+jjgncH9XqcnW85SbThuI4
Malware Config
Extracted
xenorat
7.tcp.eu.ngrok.io
radnom123_34X41
-
delay
5000
-
install_path
appdata
-
port
10543
-
startup_name
window system
Targets
-
-
Target
123.exe
-
Size
45KB
-
MD5
fd3fa42906bc5b6a8c5e797431d3e9f1
-
SHA1
8f21e90966b9682640ae12d89b7485f18fc960c5
-
SHA256
8a9c7963d74a81dbbdd82f50e0ef9014777474c9ff55bc26bbf64681bb571cfb
-
SHA512
b04e17457c28d791717751626f3e88872fc4c4792e6da90d8e008817afc6c3b7ef8bd2afc09ecd0c951d74f8d2922d1eaa190ae3c3d166dd6cf93338c70947a1
-
SSDEEP
768:BdhO/poiiUcjlJInLr6BH9Xqk5nWEZ5SbTDaUuI7CPW5Q:/w+jjgncH9XqcnW85SbThuI4
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-