General
-
Target
test.exe
-
Size
163KB
-
Sample
241130-dnx52syqcw
-
MD5
4531671a39dfdd4a9711e64400f7f0fa
-
SHA1
55357cd9c957105f9b5af04f1a8e65101229ae4a
-
SHA256
76c45fabe4e4438e1d9d434e9cd104219fc7e855b90bafaf52b70c069a495b65
-
SHA512
d35d54d6986dfbe22fcac76792853cacdc1c4b0eecba5cd7703c3b1f50005d42b8e36ccc6a8c5a4928d2c49413896e11779f4e23357b7229b0863511f5ab3f52
-
SSDEEP
3072:O6kZB/A8p+F3sh+3NB/fXdBcRDmGCKX+Ip4rI4gei6+SRaBwV0BfI6Ks2:hkZB/A8p+F2+3b/fXdKcLKXhG84geVoP
Static task
static1
Behavioral task
behavioral1
Sample
test.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xenorat
10.160.192.195
-
delay
5000
-
install_path
appdata
-
port
13579
-
startup_name
Windows CL
Targets
-
-
Target
test.exe
-
Size
163KB
-
MD5
4531671a39dfdd4a9711e64400f7f0fa
-
SHA1
55357cd9c957105f9b5af04f1a8e65101229ae4a
-
SHA256
76c45fabe4e4438e1d9d434e9cd104219fc7e855b90bafaf52b70c069a495b65
-
SHA512
d35d54d6986dfbe22fcac76792853cacdc1c4b0eecba5cd7703c3b1f50005d42b8e36ccc6a8c5a4928d2c49413896e11779f4e23357b7229b0863511f5ab3f52
-
SSDEEP
3072:O6kZB/A8p+F3sh+3NB/fXdBcRDmGCKX+Ip4rI4gei6+SRaBwV0BfI6Ks2:hkZB/A8p+F2+3b/fXdKcLKXhG84geVoP
-
Detect XenoRat Payload
-
Xenorat family
-
Drops startup file
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-