Malware Analysis Report

2024-08-06 18:12

Sample ID 240704-t6nbkayhpl
Target 383075faf72f71b208a817036ddaa06046616ebb2e3c21affb6d1675552feef4
SHA256 383075faf72f71b208a817036ddaa06046616ebb2e3c21affb6d1675552feef4
Tags
xenorat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

383075faf72f71b208a817036ddaa06046616ebb2e3c21affb6d1675552feef4

Threat Level: Known bad

The file 383075faf72f71b208a817036ddaa06046616ebb2e3c21affb6d1675552feef4 was found to be: Known bad.

Malicious Activity Summary

xenorat

Xenorat family

Unsigned PE

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-07-04 16:40

Signatures

Xenorat family

xenorat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-04 16:40

Reported

2024-07-04 17:09

Platform

win7-20240220-en

Max time kernel

0s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-04 16:40

Reported

2024-07-04 17:08

Platform

win10v2004-20240508-en

Max time kernel

0s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A