Behavioral task
behavioral1
Sample
wave.exe
Resource
win7-20241010-en
General
-
Target
wave.exe
-
Size
121KB
-
MD5
0c8d27584306ac7ca56b6642847c83f1
-
SHA1
a5be54c39b1ee1a173f0b78966b52de9f661c715
-
SHA256
803396bb833dd85a4a5b4910b448442f8c78496d81d77117cf4b534c35b9967c
-
SHA512
1628197016ba08acd9ace409eb0e8afc579ea7a9b22268fc56520a34383288edd68ab00e36ee4030de39f255b12d47c1512575c79cb7da8168c7fe5e0c280831
-
SSDEEP
3072:tw+jqm91UbTKXqeCHHoaqyfiFKDt+CS4fVX3Lwa4:aWP91UbMCoEfiFKZ+CS6Lwa
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
7276
-
startup_name
wave
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule sample family_xenorat -
Xenorat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource wave.exe
Files
-
wave.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ