General
-
Target
ImBetter.exe
-
Size
45KB
-
Sample
241124-1r6b6a1qfx
-
MD5
b6c160245a6d0a7978330729185fe3a5
-
SHA1
0c731d682d4acd18c151594e95e4b29c4501fc72
-
SHA256
b308143fdf4fa89fce16032af2bb2741cc116f0565b618fc76af52f424c631ad
-
SHA512
3c4c46134d057ac2e786f5492002189fb7b06ea9476e9e64edb43c4261ac13d3457d2078b8fda916d13869b651d57573cbcc1b7ee87e0a31a387d6968284fcf3
-
SSDEEP
768:RdhO/poiiUcjlJIn9TwH9Xqk5nWEZ5SbTDa5WI7CPW5Z:Pw+jjgneH9XqcnW85SbTwWIh
Malware Config
Extracted
xenorat
allow-property.gl.joinmc.link
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
25565
-
startup_name
nothingset
Targets
-
-
Target
ImBetter.exe
-
Size
45KB
-
MD5
b6c160245a6d0a7978330729185fe3a5
-
SHA1
0c731d682d4acd18c151594e95e4b29c4501fc72
-
SHA256
b308143fdf4fa89fce16032af2bb2741cc116f0565b618fc76af52f424c631ad
-
SHA512
3c4c46134d057ac2e786f5492002189fb7b06ea9476e9e64edb43c4261ac13d3457d2078b8fda916d13869b651d57573cbcc1b7ee87e0a31a387d6968284fcf3
-
SSDEEP
768:RdhO/poiiUcjlJIn9TwH9Xqk5nWEZ5SbTDa5WI7CPW5Z:Pw+jjgneH9XqcnW85SbTwWIh
-
Detect XenoRat Payload
-
Xenorat family
-