Behavioral task
behavioral1
Sample
b1593574e46fb1f30b1da4fa594f43bb52b051a616db390abf23ef45508f8b13.exe
Resource
win7-20240903-en
General
-
Target
12ac061f02656d9e3d3cfbdd429a6bcf.bin
-
Size
20KB
-
MD5
6ea70f3844a533b1cadd5cb4d53f2b43
-
SHA1
6ce29b7bbe29348ce44c9c8495b7483accb1a915
-
SHA256
3f403b5af43cc9437a2e44f42de9274f543f2e2ef7057cf2c1d1ec58129c486c
-
SHA512
7d9115a9c47dbd9d9934f9edea7b301bf80a1abfbdc5ee8c651bc526b4b4a03b64141a05976f6e34bc74ba46bafae430fb7015547fc7887091eea914ae9ba3f2
-
SSDEEP
384:KZr71FDNEV4sJdeOh3StCaw29N000XcuKrzrKOIg42qNbNQ4ifFASDLFZMWfGcHE:KZrTDi6sJ8Ohy2Ki0//rzrShNbNbif1A
Malware Config
Extracted
xenorat
194.59.30.69
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
16589
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule static1/unpack001/b1593574e46fb1f30b1da4fa594f43bb52b051a616db390abf23ef45508f8b13.exe family_xenorat -
Xenorat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b1593574e46fb1f30b1da4fa594f43bb52b051a616db390abf23ef45508f8b13.exe
Files
-
12ac061f02656d9e3d3cfbdd429a6bcf.bin.zip
Password: infected
-
b1593574e46fb1f30b1da4fa594f43bb52b051a616db390abf23ef45508f8b13.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ