General

  • Target

    3040-16-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    17e6c9fb04fdd2cd101ab5c415fb5097

  • SHA1

    6cac0a373d2ec3352502e4794477dd264d50364c

  • SHA256

    9f6b44b598fdf6ab04ea442267c100e543816b9668cead7e4b0f5a7805dfc883

  • SHA512

    0ca92e725cb75ca642535cc8bfefb59d591ca775eacd1c558a06fe82993fb0a25900c83ddc9665ccbd5f2e7658941894f6b4485a3fe55da17f3955617b7188e1

  • SSDEEP

    768:9SisJmceOoRDlY8spLfFpyT7QHbtm+mEyqnN+8N9:tsJmfO2De7prj4QHbtiEH4U9

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

dns.dobiamfollollc.online

Mutex

Solid_rat_nd8889g

Attributes
  • delay

    61000

  • install_path

    appdata

  • port

    1283

  • startup_name

    bns

Signatures

  • Xenorat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3040-16-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections