General
-
Target
9cf34288dda36ca0b013d6978d1acfe4.bin
-
Size
552KB
-
Sample
241210-r79vvatjgm
-
MD5
997d2d7b6986515f7bfbc84c9edaa0e0
-
SHA1
edf4d5dae05115f4bff23e54506f3c7f4f11bfa8
-
SHA256
feb5795a325a28e892dddd468239194fb38a2fddec638cc43d7a314ad7e639b7
-
SHA512
1afe78a94bf37e0eab7a4053c439968b1af886e82ae662ba1468dd2274cae137eb050f04c5ca1ba60735a315b455d36e2c1d0c95464c3671a2bf508baf3a3c81
-
SSDEEP
12288:OizbkQBypPADIImm3ldv5Xs1jZxuzypMtd/JlmBg:lCPAD7mmVdYxyyM/Jlmu
Static task
static1
Behavioral task
behavioral1
Sample
a40e1563e9bbc7683cc81adcecdf4450817ad2e18ee8534b85714081a500dd65.exe
Resource
win7-20240729-en
Malware Config
Extracted
xenorat
luxuryshield.giize.com
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
a40e1563e9bbc7683cc81adcecdf4450817ad2e18ee8534b85714081a500dd65.exe
-
Size
743KB
-
MD5
9cf34288dda36ca0b013d6978d1acfe4
-
SHA1
634560fe79683a2019ee75f669e5bff02c1789f7
-
SHA256
a40e1563e9bbc7683cc81adcecdf4450817ad2e18ee8534b85714081a500dd65
-
SHA512
fcf0a8ce71ce9bb1fcba9f14158e8919098dfa75172128bf886bd256216a3b9ef0e44c1ac63177e228fb85522077c8aa1080e2bd415ce29fe341a39dd942f764
-
SSDEEP
12288:GN2pJlOwXBiPzEhmH5lxgZvvXt+FgqQ8t/6SUoWDGxPlh3i4H9ksxUWv:XrZvPQqqQ8tCSQoh3hxd
-
Detect XenoRat Payload
-
Xenorat family
-
Drops startup file
-
Suspicious use of SetThreadContext
-