Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 02:54
Behavioral task
behavioral1
Sample
ebb56c98f57ee869f385d1b04d04e99ba5fe78964c915c6bd4b089438cfd8c76.exe
Resource
win7-20240708-en
General
-
Target
ebb56c98f57ee869f385d1b04d04e99ba5fe78964c915c6bd4b089438cfd8c76.exe
-
Size
45KB
-
MD5
15f9fbe4d824f398f3910440711964aa
-
SHA1
268cbaf9557825a089533a0eaf15f13d1eb80dab
-
SHA256
ebb56c98f57ee869f385d1b04d04e99ba5fe78964c915c6bd4b089438cfd8c76
-
SHA512
da5f34f3e597265688afe1f3cdc97a5dcd1b8dbed1bdd74f61460462f84f91c94dec34df80935b69c468f532182ce0871606234b1c18ee8efd5603c786eba586
-
SSDEEP
768:QdhO/poiiUcjlJIncFH9Xqk5nWEZ5SbTDaXWI7CPW5J:Cw+jjgnsH9XqcnW85SbTWWIR
Malware Config
Extracted
xenorat
importns24.duckdns.org
imports
-
install_path
nothingset
-
port
2424
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral2/memory/4968-1-0x00000000006B0000-0x00000000006C2000-memory.dmp family_xenorat -
Xenorat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebb56c98f57ee869f385d1b04d04e99ba5fe78964c915c6bd4b089438cfd8c76.exe