General
-
Target
Dropper_protected.exe
-
Size
5.7MB
-
Sample
241101-xkzdgstfrb
-
MD5
95f9265e284dbccd509025fdc368cadd
-
SHA1
a63c64dfe79d97aba4056539e1ae9905d1cf518f
-
SHA256
dd1d0772b969998d05d329411a3dec9ec52b344df956749dc9998f48107487d0
-
SHA512
18e0d2e959285dcc8b96bcb3dcbedaf7a8e868fb705f9d941ad5914820f17fd4a4d1889a713d032ffa65fbc3365635f7407b616f86b206406d31bba2e0f03040
-
SSDEEP
98304:d4Ngr8BHpJCLdpkaPDE+7sP3Nh7GsOSa5NJcHjJmZLXuDQn9ebtmg2bhWpxBZMxN:dV8h4pkaPDE+Uj7G7pNJqEKKitF2VWLE
Static task
static1
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
Dropper_protected.exe
-
Size
5.7MB
-
MD5
95f9265e284dbccd509025fdc368cadd
-
SHA1
a63c64dfe79d97aba4056539e1ae9905d1cf518f
-
SHA256
dd1d0772b969998d05d329411a3dec9ec52b344df956749dc9998f48107487d0
-
SHA512
18e0d2e959285dcc8b96bcb3dcbedaf7a8e868fb705f9d941ad5914820f17fd4a4d1889a713d032ffa65fbc3365635f7407b616f86b206406d31bba2e0f03040
-
SSDEEP
98304:d4Ngr8BHpJCLdpkaPDE+7sP3Nh7GsOSa5NJcHjJmZLXuDQn9ebtmg2bhWpxBZMxN:dV8h4pkaPDE+Uj7G7pNJqEKKitF2VWLE
-
Detect XenoRat Payload
-
Xenorat family
-
Executes dropped EXE
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-