General

  • Target

    123.exe

  • Size

    45KB

  • MD5

    fd3fa42906bc5b6a8c5e797431d3e9f1

  • SHA1

    8f21e90966b9682640ae12d89b7485f18fc960c5

  • SHA256

    8a9c7963d74a81dbbdd82f50e0ef9014777474c9ff55bc26bbf64681bb571cfb

  • SHA512

    b04e17457c28d791717751626f3e88872fc4c4792e6da90d8e008817afc6c3b7ef8bd2afc09ecd0c951d74f8d2922d1eaa190ae3c3d166dd6cf93338c70947a1

  • SSDEEP

    768:BdhO/poiiUcjlJInLr6BH9Xqk5nWEZ5SbTDaUuI7CPW5Q:/w+jjgncH9XqcnW85SbThuI4

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

7.tcp.eu.ngrok.io

Mutex

radnom123_34X41

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    10543

  • startup_name

    window system

Signatures

  • Xenorat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 123.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections