Behavioral task
behavioral1
Sample
Horionexexecutor.exe
Resource
win7-20240903-en
General
-
Target
Horionexexecutor.exe
-
Size
468KB
-
MD5
59f30931892470045a237180c4df3566
-
SHA1
54cd26c02a62cb7af4756b74659bd275e3647fdc
-
SHA256
b9e7ce8956dcb00b56b550035d339beb309d227e907b0b2037ac1278b0711524
-
SHA512
091f00e46f8632591c43db97a5b32564fc5fee6a8267bb196209b8e7b914348bfe64c2333df8aba1b2f289882bb90db781fc1c8f55445c88899b572305e87799
-
SSDEEP
3072:mw+jq8yeF91UbTqLy5dUBoqcPvSqqw1QHgtUOJ/yDPjPVc2WLiK4XVfI2j:TW7yeF91UbHdXrSYiEnJ8b22Wo
Malware Config
Extracted
xenorat
127.0.0.1
horion executor
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
horion executor
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule sample family_xenorat -
Xenorat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Horionexexecutor.exe
Files
-
Horionexexecutor.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 424KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ