General
-
Target
vware.exe
-
Size
45KB
-
Sample
241222-qpsyyazpfj
-
MD5
42faf67435979c1245010683d8e916b5
-
SHA1
b93b780736398c6e4001c150276ccb24982ed67f
-
SHA256
eef18c81faeee1877aa9cd8d8aef18b643a434fd3da221cc724070ec863e5fcd
-
SHA512
ff0fd19b423da9c89a6729790f5f39bac4e2dd03d62ad8c8fcf9628afb7e57a58b0a4700ee8811ba6c6191390c7cf3816342852fb90fc583ba261fd4637fcd86
-
SSDEEP
768:RdhO/poiiUcjlJInvvH9Xqk5nWEZ5SbTDaJWI7CPW5R:Pw+jjgn3H9XqcnW85SbTAWIJ
Behavioral task
behavioral1
Sample
vware.exe
Resource
win7-20241010-en
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
vware.exe
-
Size
45KB
-
MD5
42faf67435979c1245010683d8e916b5
-
SHA1
b93b780736398c6e4001c150276ccb24982ed67f
-
SHA256
eef18c81faeee1877aa9cd8d8aef18b643a434fd3da221cc724070ec863e5fcd
-
SHA512
ff0fd19b423da9c89a6729790f5f39bac4e2dd03d62ad8c8fcf9628afb7e57a58b0a4700ee8811ba6c6191390c7cf3816342852fb90fc583ba261fd4637fcd86
-
SSDEEP
768:RdhO/poiiUcjlJInvvH9Xqk5nWEZ5SbTDaJWI7CPW5R:Pw+jjgn3H9XqcnW85SbTAWIJ
-
Detect XenoRat Payload
-
Xenorat family
-