General

  • Target

    BootstrapperNew 1.exe

  • Size

    50KB

  • MD5

    1eff35c8530e3775e44c9f7096ebcda0

  • SHA1

    41b00fb6bb5d0cece18910d3789f6a70b5eb1906

  • SHA256

    15b6b5588bca8c558900e44092cb741a872974e33ccb8547618cad751e464b9c

  • SHA512

    7ae7b6e09b8afba8b27fa4db75c100659ef1e671c11b877067763ebf352f3a05404c71e587727e3cd15f68acaf539da4328f6785e4c28646e8e490c4c98903e0

  • SSDEEP

    768:qdhO/poiiUcjlJIn3dH9Xqk5nWEZ5SbTDa5WI7CPW5ispY:Mw+jjgntH9XqcnW85SbTIWIqspY

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

192.168.1.236

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    4785

  • install_path

    appdata

  • port

    1194

  • startup_name

    Solara Bootstrapper Dependinces

Signatures

  • Detect XenoRat Payload 1 IoCs
  • Xenorat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • BootstrapperNew 1.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections