General
-
Target
svc.exe
-
Size
45KB
-
Sample
240903-a7a8vascjn
-
MD5
75cf1faac1fbab522db5273d2916eb02
-
SHA1
b3ede9b5b70d9742a576c6f8e70e3961a24612a8
-
SHA256
e20a68d2f697e867867fa7a54688b02d80f7703a4134747fb1c4f90068cd76c6
-
SHA512
ab2946a0f8d00b66f5a0e86573eb129c3a536ae36351144f51ed6857be975a14d02b0a6df1ab9172a251fbf88baa976ecef3410e45fa4bb2ea406c2c9edbd1e2
-
SSDEEP
768:hdhO/poiiUcjlJInUbqmH9Xqk5nWEZ5SbTDawWI7CPW5K:fw+jjgnWH9XqcnW85SbThWIS
Malware Config
Extracted
xenorat
10.200.166.240
svchost
-
delay
5000
-
install_path
appdata
-
port
4895
-
startup_name
svchost.exe
Targets
-
-
Target
svc.exe
-
Size
45KB
-
MD5
75cf1faac1fbab522db5273d2916eb02
-
SHA1
b3ede9b5b70d9742a576c6f8e70e3961a24612a8
-
SHA256
e20a68d2f697e867867fa7a54688b02d80f7703a4134747fb1c4f90068cd76c6
-
SHA512
ab2946a0f8d00b66f5a0e86573eb129c3a536ae36351144f51ed6857be975a14d02b0a6df1ab9172a251fbf88baa976ecef3410e45fa4bb2ea406c2c9edbd1e2
-
SSDEEP
768:hdhO/poiiUcjlJInUbqmH9Xqk5nWEZ5SbTDawWI7CPW5K:fw+jjgnWH9XqcnW85SbThWIS
-
Executes dropped EXE
-