General
-
Target
BootstrapperNew.exe
-
Size
45KB
-
MD5
3a34dc293da8074abb942806325f438e
-
SHA1
d09bd07c14bc2dbfc6bb5e55fdde0069ac6a6487
-
SHA256
49374ca9edc1e653e96c8dcab7d387fa93b86280b8d6f5addfa732cada9a22e0
-
SHA512
0f33e9687173416c3cc164d6fd293dd9c043ebd607ab52ea00b41bb8b6e7c0cfef668fa5b71256e757499125f7d85dac9c8687de5b165ac6715e177e01cb09ab
-
SSDEEP
768:4dhO/poiiUcjlJInSVH9Xqk5nWEZ5SbTDaJuI7CPW5q:qw+jjgnSH9XqcnW85SbTkuIC
Malware Config
Extracted
xenorat
1.1.1.1
Solara.Bootsrapper
-
delay
5000
-
install_path
temp
-
port
2386
-
startup_name
AntiVirus
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule sample family_xenorat -
Xenorat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource BootstrapperNew.exe
Files
-
BootstrapperNew.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ