General
-
Target
sample
-
Size
561B
-
Sample
241220-xfqksa1pf1
-
MD5
e87f5790521ef2b684ebcdb747c62b26
-
SHA1
92152a2203786684b0e3e07b92939b6bc2f24630
-
SHA256
aed5753c6a243f6d6fe9090cfd089156ed8be67b6f29aac7b6fbf58bfec14623
-
SHA512
d5d579f0ab13c93d04e80b9720241c4c6e7589f047f9ee7cfc1effd54fdb27b7d85372df2a88b35830b70e395ef2f6db88fc6f85a1b739f50d78acb9797ae8e4
Static task
static1
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
sample
-
Size
561B
-
MD5
e87f5790521ef2b684ebcdb747c62b26
-
SHA1
92152a2203786684b0e3e07b92939b6bc2f24630
-
SHA256
aed5753c6a243f6d6fe9090cfd089156ed8be67b6f29aac7b6fbf58bfec14623
-
SHA512
d5d579f0ab13c93d04e80b9720241c4c6e7589f047f9ee7cfc1effd54fdb27b7d85372df2a88b35830b70e395ef2f6db88fc6f85a1b739f50d78acb9797ae8e4
-
Detect XenoRat Payload
-
Xenorat family
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-