General
-
Target
2523.exe
-
Size
45KB
-
Sample
250219-ls75taykaz
-
MD5
a31469c3b0fa40d70f704246bdc57a72
-
SHA1
3ff1b89a9d9d3f9f4c7ca7ea8eb8839eb8fdcc5d
-
SHA256
08f3bedf08707c9fc97f1097ff76c70243cdcaf06dd393d0bf21a8494fb81c7a
-
SHA512
f1d2db6e0d5ebe3dcb199a488e8b2c9fc56cf2e54f714f9594c7543de693c8a4ed69c9b112902c742a96e5568ba6fa281554abfb87aea5b727b9aea99101f763
-
SSDEEP
768:3dhO/poiiUcjlJIncQuH9Xqk5nWEZ5SbTDazWI7CPW5N:tw+jjgnUH9XqcnW85SbTSWI1
Behavioral task
behavioral1
Sample
2523.exe
Resource
win7-20241010-en
Malware Config
Extracted
xenorat
91.51.46.90
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4844
-
startup_name
nothingset
Targets
-
-
Target
2523.exe
-
Size
45KB
-
MD5
a31469c3b0fa40d70f704246bdc57a72
-
SHA1
3ff1b89a9d9d3f9f4c7ca7ea8eb8839eb8fdcc5d
-
SHA256
08f3bedf08707c9fc97f1097ff76c70243cdcaf06dd393d0bf21a8494fb81c7a
-
SHA512
f1d2db6e0d5ebe3dcb199a488e8b2c9fc56cf2e54f714f9594c7543de693c8a4ed69c9b112902c742a96e5568ba6fa281554abfb87aea5b727b9aea99101f763
-
SSDEEP
768:3dhO/poiiUcjlJIncQuH9Xqk5nWEZ5SbTDazWI7CPW5N:tw+jjgnUH9XqcnW85SbTSWI1
-
Detect XenoRat Payload
-
Xenorat family
-