Behavioral task
behavioral1
Sample
676-341-0x0000000000400000-0x000000000042C000-memory.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
676-341-0x0000000000400000-0x000000000042C000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
676-341-0x0000000000400000-0x000000000042C000-memory.dmp
-
Size
176KB
-
MD5
bd8b2f410688ca655f38ddd3f038dd18
-
SHA1
fd7d67e8999793ab03e9ced888a84be5e0855176
-
SHA256
f5777be48cb503af368ec30896aea9f7ff6379b2520a634a20dad1b3d0111053
-
SHA512
310276cdc8065295c1a83d1d93a5dc517146d3c740b646a7b2840531db5792dcb7123d2e78645220604b756360a77522d7ee63e9a2cc307978105e823a9c8ff8
-
SSDEEP
3072:tw+jqcM91UbTFLdzFBPzzSl+XVionHzzfMZJtklc5Dz4ITIQxUcwBrle774bcaBq:aW3M91UbV5zzSl+XoEzzG77kcavP6
Malware Config
Extracted
xenorat
dgorijan20785.hopto.org
win_sv88778sl
-
delay
5000
-
install_path
temp
-
port
4488
-
startup_name
logons
Signatures
-
Xenorat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 676-341-0x0000000000400000-0x000000000042C000-memory.dmp
Files
-
676-341-0x0000000000400000-0x000000000042C000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ