General

  • Target

    wave.exe

  • Size

    121KB

  • MD5

    0c8d27584306ac7ca56b6642847c83f1

  • SHA1

    a5be54c39b1ee1a173f0b78966b52de9f661c715

  • SHA256

    803396bb833dd85a4a5b4910b448442f8c78496d81d77117cf4b534c35b9967c

  • SHA512

    1628197016ba08acd9ace409eb0e8afc579ea7a9b22268fc56520a34383288edd68ab00e36ee4030de39f255b12d47c1512575c79cb7da8168c7fe5e0c280831

  • SSDEEP

    3072:tw+jqm91UbTKXqeCHHoaqyfiFKDt+CS4fVX3Lwa4:aWP91UbMCoEfiFKZ+CS6Lwa

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    7276

  • startup_name

    wave

Signatures

  • Detect XenoRat Payload 1 IoCs
  • Xenorat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • wave.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections