General
-
Target
BootstrapperNew.exe
-
Size
45KB
-
Sample
250111-ytn5jsznhl
-
MD5
3a34dc293da8074abb942806325f438e
-
SHA1
d09bd07c14bc2dbfc6bb5e55fdde0069ac6a6487
-
SHA256
49374ca9edc1e653e96c8dcab7d387fa93b86280b8d6f5addfa732cada9a22e0
-
SHA512
0f33e9687173416c3cc164d6fd293dd9c043ebd607ab52ea00b41bb8b6e7c0cfef668fa5b71256e757499125f7d85dac9c8687de5b165ac6715e177e01cb09ab
-
SSDEEP
768:4dhO/poiiUcjlJInSVH9Xqk5nWEZ5SbTDaJuI7CPW5q:qw+jjgnSH9XqcnW85SbTkuIC
Malware Config
Extracted
xenorat
1.1.1.1
Solara.Bootsrapper
-
delay
5000
-
install_path
temp
-
port
2386
-
startup_name
AntiVirus
Targets
-
-
Target
BootstrapperNew.exe
-
Size
45KB
-
MD5
3a34dc293da8074abb942806325f438e
-
SHA1
d09bd07c14bc2dbfc6bb5e55fdde0069ac6a6487
-
SHA256
49374ca9edc1e653e96c8dcab7d387fa93b86280b8d6f5addfa732cada9a22e0
-
SHA512
0f33e9687173416c3cc164d6fd293dd9c043ebd607ab52ea00b41bb8b6e7c0cfef668fa5b71256e757499125f7d85dac9c8687de5b165ac6715e177e01cb09ab
-
SSDEEP
768:4dhO/poiiUcjlJInSVH9Xqk5nWEZ5SbTDaJuI7CPW5q:qw+jjgnSH9XqcnW85SbTkuIC
-
Detect XenoRat Payload
-
Xenorat family
-
Executes dropped EXE
-