General

  • Target

    2092-351-0x0000000000400000-0x000000000042C000-memory.dmp

  • Size

    176KB

  • Sample

    240827-vlk65sshjm

  • MD5

    74f0cfb2b89d31184cd525ea3a212aef

  • SHA1

    78579e9f4b74da20e6837a8b6fb118a6749c6ebc

  • SHA256

    b77eb91d8bf32ef5d2224e5b5da6ef1c1ebaeecb2e5cb65e2025e2f4d558c379

  • SHA512

    661a4abc8d1f6f8f9b1a6a80c7edea6c57e29583e119467cb7ccf00fe59595a6c5991083e9ee0f81cf381725fd7606d29aa1c9198155546dac9abebaa8b59a37

  • SSDEEP

    3072:xw+jqcM91UbTFLdzFBPzzSl+XVionHzzfMZJtklc5Dz4ITIQxUcwBrle774bcaBq:+W3M91UbV5zzSl+XoEzzG77kcavP6

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

dgorijan20785.hopto.org

Mutex

win_sv88778sl

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    4488

  • startup_name

    logons

Targets

    • Target

      2092-351-0x0000000000400000-0x000000000042C000-memory.dmp

    • Size

      176KB

    • MD5

      74f0cfb2b89d31184cd525ea3a212aef

    • SHA1

      78579e9f4b74da20e6837a8b6fb118a6749c6ebc

    • SHA256

      b77eb91d8bf32ef5d2224e5b5da6ef1c1ebaeecb2e5cb65e2025e2f4d558c379

    • SHA512

      661a4abc8d1f6f8f9b1a6a80c7edea6c57e29583e119467cb7ccf00fe59595a6c5991083e9ee0f81cf381725fd7606d29aa1c9198155546dac9abebaa8b59a37

    • SSDEEP

      3072:xw+jqcM91UbTFLdzFBPzzSl+XVionHzzfMZJtklc5Dz4ITIQxUcwBrle774bcaBq:+W3M91UbV5zzSl+XoEzzG77kcavP6

    Score
    1/10

MITRE ATT&CK Matrix

Tasks