General
-
Target
xeno.exe
-
Size
45KB
-
Sample
250311-fr8gastsf1
-
MD5
0e329e5c31937eb3484eeca9fc505f8e
-
SHA1
786352c168b3d82c99f819b6b2b5a433abe26bfb
-
SHA256
c9883d323f76b9e9bb3b8462786e51e5f1234b782e14aff683dc18d1d2936b75
-
SHA512
de9baab5cc565138ef117960c311f0e9a39cfe399d8347b106e393505a8667d344178f76b67783b390f00a96e25347c28e6d1b597f118cc4e075f4858c5f0a2a
-
SSDEEP
768:SdhO/poiiUcjlJIn/lH9Xqk5nWEZ5SbTDaMWI7CPW5h:0w+jjgn9H9XqcnW85SbTFWI5
Malware Config
Extracted
xenorat
172.22.88.67
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
xeno.exe
-
Size
45KB
-
MD5
0e329e5c31937eb3484eeca9fc505f8e
-
SHA1
786352c168b3d82c99f819b6b2b5a433abe26bfb
-
SHA256
c9883d323f76b9e9bb3b8462786e51e5f1234b782e14aff683dc18d1d2936b75
-
SHA512
de9baab5cc565138ef117960c311f0e9a39cfe399d8347b106e393505a8667d344178f76b67783b390f00a96e25347c28e6d1b597f118cc4e075f4858c5f0a2a
-
SSDEEP
768:SdhO/poiiUcjlJIn/lH9Xqk5nWEZ5SbTDaMWI7CPW5h:0w+jjgn9H9XqcnW85SbTFWI5
-
Detect XenoRat Payload
-
Xenorat family
-
Executes dropped EXE
-