General
-
Target
test.exe
-
Size
45KB
-
Sample
250217-tb9w3szpdk
-
MD5
1e05557defdc34b585d6cc8505321bd6
-
SHA1
d4ba25063f8967f12681cff8016bb88f479c1bbe
-
SHA256
18f165749ec85eaf6eb5dd7560d2e735f43a25efab54b5098b8239349ed43fc1
-
SHA512
b7e5a0fd7e63c5b18beb938f6395aaad233eae1b46023e85fee807cad5d503645770fd942e12b7467aa9236e372ec1e496dd2a935fb4d3cd423bec882ccf4eb5
-
SSDEEP
768:ZdhO/poiiUcjlJInngH9Xqk5nWEZ5SbTDaYuI7CPW5I:Xw+jjgngH9XqcnW85SbT9uIA
Malware Config
Extracted
xenorat
numbers-insights.gl.at.ply.gg
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
52152
-
startup_name
cool
Targets
-
-
Target
test.exe
-
Size
45KB
-
MD5
1e05557defdc34b585d6cc8505321bd6
-
SHA1
d4ba25063f8967f12681cff8016bb88f479c1bbe
-
SHA256
18f165749ec85eaf6eb5dd7560d2e735f43a25efab54b5098b8239349ed43fc1
-
SHA512
b7e5a0fd7e63c5b18beb938f6395aaad233eae1b46023e85fee807cad5d503645770fd942e12b7467aa9236e372ec1e496dd2a935fb4d3cd423bec882ccf4eb5
-
SSDEEP
768:ZdhO/poiiUcjlJInngH9Xqk5nWEZ5SbTDaYuI7CPW5I:Xw+jjgngH9XqcnW85SbT9uIA
-
Detect XenoRat Payload
-
Xenorat family
-
Downloads MZ/PE file
-