General

  • Target

    gowno.exe

  • Size

    45KB

  • MD5

    6145e62108a1aa3cd628939ba740449d

  • SHA1

    812b83703130caf3832af8f9fb5dbd5d9045a2fc

  • SHA256

    ef2ba29f54fd3d48876405dc424f61ab27222fe36b5b5721c4a5ccca6e879ad1

  • SHA512

    20a57cb7119e570ded6876ca830c8070e239340ec64c0c0b8d0fbeeea121485b69c2372a0dcdb07ea54c72b9991db76e75f439dad442cccfd82987c7456a175f

  • SSDEEP

    768:RdhO/poiiUcjlJInN1H9Xqk5nWEZ5SbTDamuI7CPW5T:Pw+jjgnHH9XqcnW85SbTzuIr

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

testgowna

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    5858

  • startup_name

    nothingset

Signatures

  • Detect XenoRat Payload 1 IoCs
  • Xenorat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • gowno.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections