Behavioral task
behavioral1
Sample
544f68f90157e53fb81a864b1aa1b30a91a7e297062cc33b9194d2d83ab124e7.exe
Resource
win7-20240708-en
General
-
Target
544f68f90157e53fb81a864b1aa1b30a91a7e297062cc33b9194d2d83ab124e7.exe
-
Size
46KB
-
MD5
9ce983782ef6449547057837fbf28149
-
SHA1
95efe91de8f9e7ddb866efc015906a1f498f8c53
-
SHA256
544f68f90157e53fb81a864b1aa1b30a91a7e297062cc33b9194d2d83ab124e7
-
SHA512
6ffd8563bc5ce87882fc835d2c753c673b4f178deb8815ec32f168c8d6344f4457d8d09aba41b1d2ddfc204257f5c29359a79525726490183bfd50cc435e84e8
-
SSDEEP
768:PdhO/poiiUcjlJInbTH9Xqk5nWEZ5SbTDaNuI7CPW5A:Fw+jjgnnH9XqcnW85SbTIuIY
Malware Config
Extracted
xenorat
roblox.airdns.org
Microsoft_nd8912d
-
delay
5000
-
install_path
appdata
-
port
62604
-
startup_name
Runtime Broker.
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule sample family_xenorat -
Xenorat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 544f68f90157e53fb81a864b1aa1b30a91a7e297062cc33b9194d2d83ab124e7.exe
Files
-
544f68f90157e53fb81a864b1aa1b30a91a7e297062cc33b9194d2d83ab124e7.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ