General

  • Target

    2092-351-0x0000000000400000-0x000000000042C000-memory.dmp

  • Size

    176KB

  • MD5

    74f0cfb2b89d31184cd525ea3a212aef

  • SHA1

    78579e9f4b74da20e6837a8b6fb118a6749c6ebc

  • SHA256

    b77eb91d8bf32ef5d2224e5b5da6ef1c1ebaeecb2e5cb65e2025e2f4d558c379

  • SHA512

    661a4abc8d1f6f8f9b1a6a80c7edea6c57e29583e119467cb7ccf00fe59595a6c5991083e9ee0f81cf381725fd7606d29aa1c9198155546dac9abebaa8b59a37

  • SSDEEP

    3072:xw+jqcM91UbTFLdzFBPzzSl+XVionHzzfMZJtklc5Dz4ITIQxUcwBrle774bcaBq:+W3M91UbV5zzSl+XoEzzG77kcavP6

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

dgorijan20785.hopto.org

Mutex

win_sv88778sl

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    4488

  • startup_name

    logons

Signatures

  • Xenorat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2092-351-0x0000000000400000-0x000000000042C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections