Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
28-12-2024 22:04
General
-
Target
nigga134.exe
-
Size
45KB
-
MD5
5e915d8b490472076ea76b8e5692a4c5
-
SHA1
72dce81720b56ece290b74a1d1be48026f80a5ae
-
SHA256
36fafa54e8346088a77ee47c02b2932841dc8b18e9cabd82fd94f1395bfb6840
-
SHA512
6a3c8960f4436c7d5772978c7c22f6d3cbb59efd4259b97f32175b7a42ee56a6ec9a9a980aa63a9af47a301ff36b503e9f4aa1af7167c2e99ebf9a66397b89de
-
SSDEEP
768:KdhO/poiiUcjlJInUA3H9Xqk5nWEZ5SbTDajuI7CPW55:sw+jjgnfH9XqcnW85SbTuuIh
Malware Config
Extracted
Family
xenorat
C2
147.185.221.24
Mutex
Xeno_rat_nd8912d
Attributes
-
delay
5000
-
install_path
nothingset
-
port
42627
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 4 IoCs
resource yara_rule behavioral1/memory/2112-1-0x0000000000ED0000-0x0000000000EE2000-memory.dmp family_xenorat behavioral1/memory/2112-6-0x0000000003510000-0x000000000351A000-memory.dmp family_xenorat behavioral1/memory/2112-10-0x00000000074A0000-0x00000000074B2000-memory.dmp family_xenorat behavioral1/memory/2112-11-0x00000000074B0000-0x00000000074BA000-memory.dmp family_xenorat -
Xenorat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nigga134.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe 2112 nigga134.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2112 nigga134.exe