Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-10-2024 07:59
General
-
Target
Xeno2.5.exe
-
Size
45KB
-
MD5
21eba8a417e37747ad57bdc5e33eebff
-
SHA1
b3499f930a98e62625cad613f86094b035388b7e
-
SHA256
cf706b768428c659ddea2d8739e8b417d94a28ea296bf1026d245c7b7d37f742
-
SHA512
9dc94f380b9330681629149171475438ccb8cda5b532f201a1d25a0948c8fe1f6f014d9864d5173888a6c7b7b4cd0e40581e90f89699e5b4d97e88434a3eb1ff
-
SSDEEP
768:mu/dRTUo0HQbWUnmjSmo2qMwKjPGaG6PIyzjbFgX3iv7moxfTl6IBDZyx:mu/dRTUPE2kKTkDy3bCXSvKsfTl1dyx
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Default
C2
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
Mutex
llFZZpC75rSO
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Xeno2.5.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno2.5.exe