General
-
Target
test.exe
-
Size
45KB
-
Sample
250117-n2z7nsxjel
-
MD5
1c87860be1c15788eb9f40b5f902d5ea
-
SHA1
ec0c10cf381893f17183d70c222958de93e08423
-
SHA256
0d6dcec7d8c63859271f3cfee5dba87b01de6276babba11c61611a9b2968d24b
-
SHA512
0485e45fc16dfdbf564657fce1432c481125e0639a0953fed630b88753cfd048823304af21d1fc6890d1154115c426f942c7bc5001ee007fbe2daf7bbb3ce057
-
SSDEEP
768:5dhO/poiiUcjlJIn7dH9Xqk5nWEZ5SbTDaSWI7CPW5p:3w+jjgnZH9XqcnW85SbTDWIx
Malware Config
Extracted
xenorat
127.0.0.1
xeno
-
delay
5000
-
install_path
appdata
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
test.exe
-
Size
45KB
-
MD5
1c87860be1c15788eb9f40b5f902d5ea
-
SHA1
ec0c10cf381893f17183d70c222958de93e08423
-
SHA256
0d6dcec7d8c63859271f3cfee5dba87b01de6276babba11c61611a9b2968d24b
-
SHA512
0485e45fc16dfdbf564657fce1432c481125e0639a0953fed630b88753cfd048823304af21d1fc6890d1154115c426f942c7bc5001ee007fbe2daf7bbb3ce057
-
SSDEEP
768:5dhO/poiiUcjlJIn7dH9Xqk5nWEZ5SbTDaSWI7CPW5p:3w+jjgnZH9XqcnW85SbTDWIx
-
Detect XenoRat Payload
-
Xenorat family
-
Executes dropped EXE
-