Behavioral task
behavioral1
Sample
852c1f349ad9389c3d449368f59be3e7f6f7d03643e46bc2760d99ac2860ff29N.exe
Resource
win7-20240903-en
General
-
Target
852c1f349ad9389c3d449368f59be3e7f6f7d03643e46bc2760d99ac2860ff29N
-
Size
45KB
-
MD5
8d9be06b296e45eb29dcca7c0ca9f120
-
SHA1
da828a56e0669b4dff97f197618b753343a3ce18
-
SHA256
852c1f349ad9389c3d449368f59be3e7f6f7d03643e46bc2760d99ac2860ff29
-
SHA512
9e571e661d122b4d9181fadf5b5909f3c62ca4bec2a626dbf8f291e4aafec3eb1986687efe02da1ceef815031b23e2819256536aa88892df5704b53e21592931
-
SSDEEP
768:LdhO/poiiUcjlJInNqH9Xqk5nWEZ5SbTDa4WI7CPW5Q:5w+jjgn0H9XqcnW85SbTpWI4
Malware Config
Extracted
xenorat
568791365f-64388.portmap.host
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
64388
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule sample family_xenorat -
Xenorat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 852c1f349ad9389c3d449368f59be3e7f6f7d03643e46bc2760d99ac2860ff29N
Files
-
852c1f349ad9389c3d449368f59be3e7f6f7d03643e46bc2760d99ac2860ff29N.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ