Behavioral task
behavioral1
Sample
ERGERTFEWRFDGFDGFDG.exe
Resource
win7-20240903-en
General
-
Target
ERGERTFEWRFDGFDGFDG.exe
-
Size
45KB
-
MD5
b1bc8b22449fdc25cd2584fc11230a0c
-
SHA1
3a7abceba9739746a0b6a8dbde462a5db722fbb9
-
SHA256
407c998c5afccd006402d4aa5476f01b061770a09bbceda6ada3a3d2871b4a2c
-
SHA512
deedc85021c7dc49002856918af11a2fb07b8ca5199bed05538c6a4794e9562aed7caf5db35a761fe1e347c15425aea4c6ed41291c26766837145c1583e25a5e
-
SSDEEP
768:tdhO/poiiUcjlJInTzH9Xqk5nWEZ5SbTDaXWI7CPW5V:jw+jjgnfH9XqcnW85SbT+WId
Malware Config
Extracted
xenorat
82.77.245.93
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
8888
-
startup_name
Widows
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule sample family_xenorat -
Xenorat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ERGERTFEWRFDGFDGFDG.exe
Files
-
ERGERTFEWRFDGFDGFDG.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ