General
-
Target
060f749a9f6dd6d01ce5e9399cfd5a3c6dfa30ce235b963da6908ec20c9e662eN
-
Size
353KB
-
Sample
240918-qle8nssfng
-
MD5
c59e8398a4a108377577812edf04e400
-
SHA1
db5d9f098cf734a264a8498415cac9e07ff8c6e1
-
SHA256
060f749a9f6dd6d01ce5e9399cfd5a3c6dfa30ce235b963da6908ec20c9e662e
-
SHA512
1d5726417b1e3c997ddf8cee2fe9e0fa5b95906d3f005e488970e5fd76661d11afc4a157927994fec519667ca22027952f7a606544c9c349c309f6ab455ebafe
-
SSDEEP
6144:rYzKLkHS0skTXfW2yqq4TCkq4+jQRYj0y/LpH0I:rrLkHZXO2yt4TY3jQRYj0y/Lxh
Static task
static1
Behavioral task
behavioral1
Sample
060f749a9f6dd6d01ce5e9399cfd5a3c6dfa30ce235b963da6908ec20c9e662eN.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
154.216.17.155
Xeno_rat_nd8912d
-
delay
50010
-
install_path
appdata
-
port
1358
-
startup_name
csvc
Targets
-
-
Target
060f749a9f6dd6d01ce5e9399cfd5a3c6dfa30ce235b963da6908ec20c9e662eN
-
Size
353KB
-
MD5
c59e8398a4a108377577812edf04e400
-
SHA1
db5d9f098cf734a264a8498415cac9e07ff8c6e1
-
SHA256
060f749a9f6dd6d01ce5e9399cfd5a3c6dfa30ce235b963da6908ec20c9e662e
-
SHA512
1d5726417b1e3c997ddf8cee2fe9e0fa5b95906d3f005e488970e5fd76661d11afc4a157927994fec519667ca22027952f7a606544c9c349c309f6ab455ebafe
-
SSDEEP
6144:rYzKLkHS0skTXfW2yqq4TCkq4+jQRYj0y/LpH0I:rrLkHZXO2yt4TY3jQRYj0y/Lxh
-
Detect XenoRat Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-