General
-
Target
https://tinyurl.com/jakbpv3c
-
Sample
250309-1jz56ssvc1
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tinyurl.com/jakbpv3c
Resource
win11-20250217-en
19 signatures
150 seconds
Malware Config
Extracted
Family
xenorat
C2
pdf-switched.gl.at.ply.gg
Mutex
Xeno_rat_nd8912d
Attributes
-
delay
5000
-
install_path
appdata
-
port
48925
-
startup_name
Exploits
Targets
-
-
Target
https://tinyurl.com/jakbpv3c
Score10/10-
Detect XenoRat Payload
-
Xenorat family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-