General
-
Target
python_309_setup.exe
-
Size
45KB
-
Sample
250220-3vv2psxpgs
-
MD5
2dcdd4f5f1aa75d0ccc76ddb36cf8e2a
-
SHA1
b4b95a1e4cee0384d20f90fefd196a4175d61faf
-
SHA256
ae89053448060576ac8a19a5ec05365bdf470f3276a63eb0fd01f82313279d1f
-
SHA512
9e000cf6188ac8aa996e77033fb0edb60349feae57aaee05d7112a3192964e230fc0d37dcfc91507e36348ce18ffb0e881c9ff5f8e12538b1a2aac57531a79a1
-
SSDEEP
768:m/dhO/poiiUcjlJInd3H9Xqk5nWEZ5SbTDaiuI7CPW5W2YAL:m1w+jjgn5H9XqcnW85SbTnuIe2YAL
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
python_309_setup.exe
-
Size
45KB
-
MD5
2dcdd4f5f1aa75d0ccc76ddb36cf8e2a
-
SHA1
b4b95a1e4cee0384d20f90fefd196a4175d61faf
-
SHA256
ae89053448060576ac8a19a5ec05365bdf470f3276a63eb0fd01f82313279d1f
-
SHA512
9e000cf6188ac8aa996e77033fb0edb60349feae57aaee05d7112a3192964e230fc0d37dcfc91507e36348ce18ffb0e881c9ff5f8e12538b1a2aac57531a79a1
-
SSDEEP
768:m/dhO/poiiUcjlJInd3H9Xqk5nWEZ5SbTDaiuI7CPW5W2YAL:m1w+jjgn5H9XqcnW85SbTnuIe2YAL
-
Detect XenoRat Payload
-
Xenorat family
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-