Analysis

  • max time kernel
    245s
  • max time network
    244s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20-12-2024 11:55

Errors

Reason
Machine shutdown

General

  • Target

    https://github.com/moom825/xeno-rat

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    1234

  • startup_name

    nothingset

Signatures

  • Detect XenoRat Payload 6 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/moom825/xeno-rat
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe8bbb3cb8,0x7ffe8bbb3cc8,0x7ffe8bbb3cd8
      2⤵
        PID:2200
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,17189407542163347268,16633600356105512123,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:2
        2⤵
          PID:4844
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,17189407542163347268,16633600356105512123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2444
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,17189407542163347268,16633600356105512123,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:8
          2⤵
            PID:556
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,17189407542163347268,16633600356105512123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
            2⤵
              PID:4640
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,17189407542163347268,16633600356105512123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
              2⤵
                PID:3336
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1904,17189407542163347268,16633600356105512123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:392
              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,17189407542163347268,16633600356105512123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1912
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,17189407542163347268,16633600356105512123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:1
                2⤵
                  PID:4928
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1904,17189407542163347268,16633600356105512123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:8
                  2⤵
                  • NTFS ADS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4616
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,17189407542163347268,16633600356105512123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2636 /prefetch:1
                  2⤵
                    PID:3228
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,17189407542163347268,16633600356105512123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1204 /prefetch:1
                    2⤵
                      PID:2540
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,17189407542163347268,16633600356105512123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6232 /prefetch:1
                      2⤵
                        PID:5088
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,17189407542163347268,16633600356105512123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:1
                        2⤵
                          PID:1740
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,17189407542163347268,16633600356105512123,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5104 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3136
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:3916
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:4244
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:4984
                            • C:\Users\Admin\AppData\Local\Temp\Temp1_Release.zip\xeno rat server.exe
                              "C:\Users\Admin\AppData\Local\Temp\Temp1_Release.zip\xeno rat server.exe"
                              1⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4960
                            • C:\Users\Admin\Downloads\Release\xeno rat server.exe
                              "C:\Users\Admin\Downloads\Release\xeno rat server.exe"
                              1⤵
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of SetWindowsHookEx
                              PID:4244
                            • C:\Users\Admin\Downloads\rat.exe
                              "C:\Users\Admin\Downloads\rat.exe"
                              1⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4112
                            • C:\Users\Admin\Downloads\rat.exe
                              "C:\Users\Admin\Downloads\rat.exe"
                              1⤵
                              • Executes dropped EXE
                              • Enumerates connected drives
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2744
                            • C:\Windows\system32\AUDIODG.EXE
                              C:\Windows\system32\AUDIODG.EXE 0x00000000000004D0 0x00000000000004CC
                              1⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2912

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              4c1a24fa898d2a98b540b20272c8e47b

                              SHA1

                              3218bff9ce95b52842fa1b8bd00be073177141ef

                              SHA256

                              bbcc378fcbf64580e7a48b4e7ca9be57fa0a1f2e747f488325685bdb18d73a95

                              SHA512

                              e61f196e7f1c9a5fe249abe9b11eea770fb2f4babc61f60b12c71f43e6fe9354cf14869daf46abc2c2655bce180252acd43c10562a2dcd31fa7d90d33253820e

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              f1d2c7fd2ca29bb77a5da2d1847fbb92

                              SHA1

                              840de2cf36c22ba10ac96f90890b6a12a56526c6

                              SHA256

                              58d0f80310f4a84f687c5ce0adaa982eb42fe4480510399fa2ae975d40bb8bc5

                              SHA512

                              ede1fafea2404f16948fe0b5ea5161ccee3ee6e40c55ff98c337eac981a6776b9c73dc030a5c59e4347aec91259f497539206e71949c33adcecbf2c846709e14

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\93e2af69-851d-4429-8928-c3e62641e0f9.tmp

                              Filesize

                              1KB

                              MD5

                              44656095a0fe8c2e109fbb43b792636e

                              SHA1

                              58605013818dd75f58861ca82f062d9ecea31df8

                              SHA256

                              1c0b13966c4dd02ccb2caca73f86d286e32669e09c754f6534b0d5c4a321715d

                              SHA512

                              60a7d9d1d90a22f5fa459b38a3023fcedaa1aa3b344511d3731eb5c71e69399bbdea17862923b711174323db5e3245f2ca255f9f0e45b2ce828a79d0c17b4b4c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              1KB

                              MD5

                              2e2d4044edec086706862f72505c9185

                              SHA1

                              8e2278bcd0139f174682dc39c5fd7095d084eaaa

                              SHA256

                              18545d24899a0dea44d5410437df645e6dabffbfb28e1f0d866363c054c5b44b

                              SHA512

                              818a852d6ad2767f718db085ad38f95632fc84147258a1d1f629d519cfe604c3e044ff0d59565cb03d871b875eebdec1ef79071c2b962ca20e1cf358356b6dc3

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              579B

                              MD5

                              698ff6dd22f4368101b2f5794f7a18a4

                              SHA1

                              70ecbbe13ec6e225224ba66db3a8ed559f5d0411

                              SHA256

                              0eab1fd6b69900b4edf4aac8461d7a67b3741ddc478675372b81d2cd944c5a11

                              SHA512

                              17634b1dbe5e5bcb6cd22ef8f3f68d1d9e1db0628dfff0df8343726dbabfaa660ab6a7cdc33da8e415db122206cfb50cf1a1aeff32d8235d2860b624fb1ab281

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              26b18c111557ed4b6d149f99f8d0011c

                              SHA1

                              4694aed3249a831e1ccf878de8177087d8af3ebe

                              SHA256

                              1a5ba9f112436cec4f9bafd55c25dd956f36613229fb7595e2eb550bd6808ab6

                              SHA512

                              025f95b4135a74ca42ea2a02e42ae96bb957bff68bbf16297ef37d8d53e6dffc12912ec1158f66cca6dfe53b0837fc9019156257bf84c91d138e07151abd92a3

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              2202f0a1247c6cc7cb33bc0d37c13fc6

                              SHA1

                              1293310e49b4362692e2ce67d3f596db4b34887b

                              SHA256

                              45112dac062cff1026d186cdf8367a566e7978fbb7230b09415db8ce9777b319

                              SHA512

                              680630c23a7bdd508ac3f8ca110b737d0fc61f934cc87fd26290d76396f2717b512f3de7c67016d5e6cebeadb5bf79156a68d44f48b44b5dec3e7d07769f91e4

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              27900b2abd8708237f653bc857b23aba

                              SHA1

                              82a73379a76245f044ad9ec7b7abb1c16c4a7b18

                              SHA256

                              94beb57187f6e53946ca93fdb4ebe33f3900b892b8ebd52d815b9afb280bf873

                              SHA512

                              9acea9d66e484e77d29925d82ecee4b559d013156f6ace487e3a02e6c98d6e9c140b21aba9525db8e100352431c4820650b9bc7d4bb317566eed61c819b51ede

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe580e82.TMP

                              Filesize

                              874B

                              MD5

                              38ae1e5829619323c78468818917d120

                              SHA1

                              cd0a925ecdb354d6bf02e9b6555630c608429683

                              SHA256

                              e0f8a015836400236d2385752117f65b7f173bee15ca6db6dc4800aeebe1754e

                              SHA512

                              d5b584e4c731b448262c2233c625fa30b97def1bd8652251d24a32c700dfdc702cefaf17c083291d61d3ae7f072d68ce7c26f3034b40cd563f4cdd462a7ceac9

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              206702161f94c5cd39fadd03f4014d98

                              SHA1

                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                              SHA256

                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                              SHA512

                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              46295cac801e5d4857d09837238a6394

                              SHA1

                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                              SHA256

                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                              SHA512

                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              10KB

                              MD5

                              98a01ff0bdd74276f2c1a066caef1bd1

                              SHA1

                              02b7ccbc50bf1cd49e3d05263133569415bb63fc

                              SHA256

                              0214d78aaa7205e7c9a12b848a2dbcd2196722a91024137e98cd72381f4f55fe

                              SHA512

                              8bbb47a1523d2b62e963bf165abab3b9051d0bda74665e2c9578059b8959b24daf6bfd3c40706c56cc802d8668c4e23106fc17fda2c667a1a5ed8c4ea36b3a5d

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              10KB

                              MD5

                              0a55f71da9e23e158f202de6c9d6b8c9

                              SHA1

                              75c8aa16e23098d11541369b7faa9e22fda0c05e

                              SHA256

                              d482780256cdd2fb0a3211719d8f406ee884c1e5f469b95d12cb4f777b0bf0b1

                              SHA512

                              34ecc639a3f5324968bd3bda1327b78633516f48ee5a9b5881602ba64b0c7a5ca01d8453779592133066524df16b093ffbc25133d50a44185f6650ee5d013a07

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              10KB

                              MD5

                              3ee8764dc0ed92cf8b3d8291abbca6af

                              SHA1

                              f96ab6da6dec400d866fc7de9c09ff4e994e6847

                              SHA256

                              d10fe5c9b2535f5f012a4a92320bdc4a18674cd62d9f9ca124b4fedcdebab116

                              SHA512

                              d713fac72c8cf8445c8a15865ee6eeab594c574ce4e0ddbd50cfc7005a9df9cf99e890e6e955802cc1e1427af330f9bfcc62191c1ba0fcd10d762a7e23a6934e

                            • C:\Users\Admin\Desktop\feefwef.exe

                              Filesize

                              45KB

                              MD5

                              c5df06809a0c1436168c7d724fe9ffd1

                              SHA1

                              bc07547b92c6d2cfde5169ac7be60898489adcfe

                              SHA256

                              bcade8a03bbceafe5182874a7499e9c4d1069c6729351ec98fa0ed9cababdc0f

                              SHA512

                              b14f91922f80dee41e3dd8451c70b4dc0bd66fa9b881448453755a5207a8b4387c781db37f14b6cdee7818e94978bfe58aa8595f75981f4938a47ada67228100

                            • C:\Users\Admin\Downloads\Release.zip

                              Filesize

                              6.4MB

                              MD5

                              89661a9ff6de529497fec56a112bf75e

                              SHA1

                              2dd31a19489f4d7c562b647f69117e31b894b5c3

                              SHA256

                              e7b275d70655db9cb43fa606bbe2e4f22478ca4962bbf9f299d66eda567d63cd

                              SHA512

                              33c765bf85fbec0e58924ece948b80a7d73b7577557eaac8865e481c61ad6b71f8b5b846026103239b3bd21f438ff0d7c1430a51a4a149f16a215faad6dab68f

                            • C:\Users\Admin\Downloads\Release.zip:Zone.Identifier

                              Filesize

                              94B

                              MD5

                              cced52b34bfd2387c302c3d496259fb2

                              SHA1

                              a79d213261354f108441ff54499b139e3bf08f58

                              SHA256

                              0c5027dc525ff889968304a5303a2b4ff978be996cf7df2b02df1a01cecf47bf

                              SHA512

                              04080f3321d80560d749238073dce291ca35f2a8e61176dbd76ac4fa368f3436b848568ea746be85cd4c9acda145d8cb9b423ba44b7e624944b4de4024a5024b

                            • C:\Users\Admin\Downloads\rat.exe

                              Filesize

                              45KB

                              MD5

                              49af6057ecbb668b5c87d41cac31cc64

                              SHA1

                              3cf6f550d278065caba3abbf4a74b92e2262d324

                              SHA256

                              14c5612de16de605ff4bbb89efa3f9707841787a0667f8def30f1f2658b342d6

                              SHA512

                              4861d1543f4bbc0aa43c7b88e04f975b4f09167fc15dfbe6aa6fefdee5b683bd2ceb595fae5999307af96e340ee60e98081852555931a562d6337ef78505a466

                            • memory/2744-366-0x00000000058B0000-0x00000000058BA000-memory.dmp

                              Filesize

                              40KB

                            • memory/2744-365-0x0000000005890000-0x00000000058A2000-memory.dmp

                              Filesize

                              72KB

                            • memory/4112-367-0x00000000015C0000-0x00000000015D2000-memory.dmp

                              Filesize

                              72KB

                            • memory/4112-362-0x0000000006250000-0x00000000062B6000-memory.dmp

                              Filesize

                              408KB

                            • memory/4112-361-0x0000000000EE0000-0x0000000000EF2000-memory.dmp

                              Filesize

                              72KB

                            • memory/4244-267-0x0000000005A90000-0x0000000005AA4000-memory.dmp

                              Filesize

                              80KB

                            • memory/4244-268-0x0000000005BF0000-0x0000000005C02000-memory.dmp

                              Filesize

                              72KB

                            • memory/4244-286-0x0000000008C70000-0x0000000008FC7000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/4244-363-0x000000000A420000-0x000000000A432000-memory.dmp

                              Filesize

                              72KB

                            • memory/4244-285-0x0000000008020000-0x00000000080D2000-memory.dmp

                              Filesize

                              712KB

                            • memory/4244-321-0x00000000067E0000-0x0000000006904000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/4244-322-0x00000000083A0000-0x00000000083BA000-memory.dmp

                              Filesize

                              104KB

                            • memory/4244-269-0x0000000009EC0000-0x0000000009EE2000-memory.dmp

                              Filesize

                              136KB

                            • memory/4960-227-0x0000000000150000-0x0000000000352000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/4960-230-0x0000000004E10000-0x0000000004E1A000-memory.dmp

                              Filesize

                              40KB

                            • memory/4960-229-0x0000000004F20000-0x0000000004FB2000-memory.dmp

                              Filesize

                              584KB

                            • memory/4960-228-0x00000000054D0000-0x0000000005A76000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/4960-233-0x0000000007850000-0x0000000007862000-memory.dmp

                              Filesize

                              72KB

                            • memory/4960-232-0x0000000007830000-0x000000000784A000-memory.dmp

                              Filesize

                              104KB

                            • memory/4960-231-0x0000000007760000-0x0000000007774000-memory.dmp

                              Filesize

                              80KB