General
-
Target
edQE3aLQ
-
Size
2KB
-
Sample
241231-b7yvks1jas
-
MD5
0429c77b246af75734deb2bb67684180
-
SHA1
da2ad23c95659a7a81bc2f3b9e23be40eba850a2
-
SHA256
62516bbf13d55df8614f58fb964ae2ed98cbe2fd07315b1cdbf8a1c61f63b11a
-
SHA512
c0be90f436e76a43de82079a17146e9cca6d6a2f0ce33f5e5d8960ea27af28df713ec894f0f932578b3ee65ce044af5ecc525ff96329522928df07e4ac710d41
Static task
static1
Malware Config
Extracted
Family
xenorat
C2
127.0.0.1
Mutex
Attributes
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
edQE3aLQ
-
Size
2KB
-
MD5
0429c77b246af75734deb2bb67684180
-
SHA1
da2ad23c95659a7a81bc2f3b9e23be40eba850a2
-
SHA256
62516bbf13d55df8614f58fb964ae2ed98cbe2fd07315b1cdbf8a1c61f63b11a
-
SHA512
c0be90f436e76a43de82079a17146e9cca6d6a2f0ce33f5e5d8960ea27af28df713ec894f0f932578b3ee65ce044af5ecc525ff96329522928df07e4ac710d41
-
Detect XenoRat Payload
-
Xenorat family
-
Executes dropped EXE
-