General
-
Target
asdasd.zip
-
Size
19KB
-
Sample
240914-wws56sycmc
-
MD5
1139087d980aae5f99c9c328108c3315
-
SHA1
f3f124186f054b486b0175b45fadea07afd70064
-
SHA256
2fd5c8c2bb74f4312124f99d3d2ebe1535cdd20cf4fff076b17ffd3691ec6fb5
-
SHA512
2dbadab1f99974bb18511d0f7e0a16923f7a16334b02366236cdd9598f619f63998cdd26c74df762e0ac44373544f907a4b20e00b0ee5f3979844768b9c6af0a
-
SSDEEP
384:NwVCYFumHmGxZ2mT3eYbeYuprHHl2vnWYIHySo0LmMzJfVxIbCOm8nIy+2D/:NwVxumHmGH2M316YuZHlUnuv1LplfVx8
Static task
static1
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
asdasd.zip
-
Size
19KB
-
MD5
1139087d980aae5f99c9c328108c3315
-
SHA1
f3f124186f054b486b0175b45fadea07afd70064
-
SHA256
2fd5c8c2bb74f4312124f99d3d2ebe1535cdd20cf4fff076b17ffd3691ec6fb5
-
SHA512
2dbadab1f99974bb18511d0f7e0a16923f7a16334b02366236cdd9598f619f63998cdd26c74df762e0ac44373544f907a4b20e00b0ee5f3979844768b9c6af0a
-
SSDEEP
384:NwVCYFumHmGxZ2mT3eYbeYuprHHl2vnWYIHySo0LmMzJfVxIbCOm8nIy+2D/:NwVxumHmGH2M316YuZHlUnuv1LplfVx8
-
Detect XenoRat Payload
-
Executes dropped EXE
-