General

  • Target

    niggers.exe

  • Size

    45KB

  • MD5

    ae22d8f92efa607adc88410cff6e5d73

  • SHA1

    69ae5beea80c2e3fd4077311f7c5b2f9076e4125

  • SHA256

    c4c6f3bc982004a69ff8e6975bbff0dc139eef614014d84207d0eb1e7fc73bae

  • SHA512

    507b76f59c4af1e7d5c5f15fc975c7e449ff07f07341b156102452d28962e5a8df37f2967bf9ac931cc8abc7d26e42a61461954d53bb8ce3fbb6faf3c4390e29

  • SSDEEP

    768:5dhO/poiiUcjlJIn4JH9Xqk5nWEZ5SbTDa6WI7CPW5P:3w+jjgnAH9XqcnW85SbTTWI3

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

192.168.1.145

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    4444

  • startup_name

    Efi spoofer auto spoof

Signatures

  • Detect XenoRat Payload 1 IoCs
  • Xenorat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • niggers.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections