Behavioral task
behavioral1
Sample
2092-351-0x0000000000400000-0x000000000042C000-memory.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2092-351-0x0000000000400000-0x000000000042C000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
2092-351-0x0000000000400000-0x000000000042C000-memory.dmp
-
Size
176KB
-
MD5
74f0cfb2b89d31184cd525ea3a212aef
-
SHA1
78579e9f4b74da20e6837a8b6fb118a6749c6ebc
-
SHA256
b77eb91d8bf32ef5d2224e5b5da6ef1c1ebaeecb2e5cb65e2025e2f4d558c379
-
SHA512
661a4abc8d1f6f8f9b1a6a80c7edea6c57e29583e119467cb7ccf00fe59595a6c5991083e9ee0f81cf381725fd7606d29aa1c9198155546dac9abebaa8b59a37
-
SSDEEP
3072:xw+jqcM91UbTFLdzFBPzzSl+XVionHzzfMZJtklc5Dz4ITIQxUcwBrle774bcaBq:+W3M91UbV5zzSl+XoEzzG77kcavP6
Malware Config
Extracted
xenorat
dgorijan20785.hopto.org
win_sv88778sl
-
delay
5000
-
install_path
temp
-
port
4488
-
startup_name
logons
Signatures
-
Xenorat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2092-351-0x0000000000400000-0x000000000042C000-memory.dmp
Files
-
2092-351-0x0000000000400000-0x000000000042C000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ