Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-02-2025 09:48
Behavioral task
behavioral1
Sample
2523.exe
Resource
win7-20241010-en
4 signatures
150 seconds
General
-
Target
2523.exe
-
Size
45KB
-
MD5
a31469c3b0fa40d70f704246bdc57a72
-
SHA1
3ff1b89a9d9d3f9f4c7ca7ea8eb8839eb8fdcc5d
-
SHA256
08f3bedf08707c9fc97f1097ff76c70243cdcaf06dd393d0bf21a8494fb81c7a
-
SHA512
f1d2db6e0d5ebe3dcb199a488e8b2c9fc56cf2e54f714f9594c7543de693c8a4ed69c9b112902c742a96e5568ba6fa281554abfb87aea5b727b9aea99101f763
-
SSDEEP
768:3dhO/poiiUcjlJIncQuH9Xqk5nWEZ5SbTDazWI7CPW5N:tw+jjgnUH9XqcnW85SbTSWI1
Malware Config
Extracted
Family
xenorat
C2
91.51.46.90
Mutex
Xeno_rat_nd8912d
Attributes
-
delay
5000
-
install_path
nothingset
-
port
4844
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral1/memory/2860-1-0x0000000000B90000-0x0000000000BA2000-memory.dmp family_xenorat -
Xenorat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2523.exe