Behavioral task
behavioral1
Sample
fwasdadf.exe
Resource
win7-20240903-en
General
-
Target
fwasdadf.exe
-
Size
45KB
-
MD5
139d4348e095c96585fb1568a1269cb4
-
SHA1
f6969aeac79443076c2c807e9e135d79061e39ec
-
SHA256
4bfcbf7c067e045768fac4a003c1407323b764203bd00996ad466e0b3bb48fdd
-
SHA512
becffa3abb05037eeea52e1b7defd3696170779893e787330d7ec14e5ece87a057ff9504c239fd99c3cfc4ae7ecdc765d24ce31385dc862ec5adfd50f5065b01
-
SSDEEP
768:5dhO/poiiUcjlJIn4JH9Xqk5nWEZ5SbTDalvWI7CPW5P:3w+jjgnAH9XqcnW85SbTQWI3
Malware Config
Extracted
xenorat
128.78.132.78
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
Efi spoofer auto spoof
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule sample family_xenorat -
Xenorat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fwasdadf.exe
Files
-
fwasdadf.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ