Behavioral task
behavioral1
Sample
bd96ab832522b95bc01637c0aa4d2a03cb9a36c1ace05ce6c0962586d3fd645f.exe
Resource
win7-20240903-en
General
-
Target
4ef7fab8f31fea78f9339ff1b61ff955.bin
-
Size
188KB
-
MD5
925ba15d9d4eb0c0519f1e9da1f1897e
-
SHA1
b4b9bdf7a2af56f2eaebbaf7ac13a1c407e12b2f
-
SHA256
325bb6951b6c7562f1b4a64f59497a8b8d365c20b4fb417f8962c4e8dd23cfde
-
SHA512
73fe4e59fd844db4c8abc0598c3204fcb0809b853c50797e593019efdb09132c196053616d212fda093fa8846b9b2e41c24f96e3031f82e823f8aeffa9c24fe4
-
SSDEEP
3072:ZPz4r4hNQHWtx+OsLtBndw5ktYblFUuENbx8G6uX/f9hpptcG+AMPFRw:Z8DHtLvdw5kt+Kdx3X9w+gvw
Malware Config
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule static1/unpack001/bd96ab832522b95bc01637c0aa4d2a03cb9a36c1ace05ce6c0962586d3fd645f.exe family_xenorat -
Xenorat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/bd96ab832522b95bc01637c0aa4d2a03cb9a36c1ace05ce6c0962586d3fd645f.exe
Files
-
4ef7fab8f31fea78f9339ff1b61ff955.bin.zip
Password: infected
-
bd96ab832522b95bc01637c0aa4d2a03cb9a36c1ace05ce6c0962586d3fd645f.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
kC*l+6U Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kC*l+6U Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
CCFB0F12 Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ