Analysis
-
max time kernel
37s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 23:19
General
-
Target
xeno rat client.exe
-
Size
46KB
-
MD5
0357dfb1dfb7ec98fe2f7a88f75fbd17
-
SHA1
78fcc4a5df49947cd24d03ccbdc3af12891add10
-
SHA256
03c3e1e4c32e9fb2667ef822a88eb6f843eb31878a22e248fd491c335453c45d
-
SHA512
15491ff405cd9cdf93bfaef0a3bef426dc3e7d60898c2be8c305973dc56e47c57a715f8984fb6ef3de4c3a164e9d18d5e3f3d87f94a9f19e40c53a4edd86ddaf
-
SSDEEP
768:6dqf0GXKojwYybbZWsiBHUuOC+iQKb9km3X9Z5SbTDapFt24:64R0z3ZWsiBHUup/9kmj5SbTcFb
Malware Config
Extracted
Family
xenorat
C2
localhost
Mutex
testing 123123
Attributes
-
delay
1000
-
install_path
nothingset
-
port
1234
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral1/memory/4656-1-0x0000000000BC0000-0x0000000000BD2000-memory.dmp family_xenorat -
Xenorat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeno rat client.exe