Behavioral task
behavioral1
Sample
xeno.exe
Resource
win7-20240903-en
General
-
Target
xeno.zip
-
Size
19KB
-
MD5
6a7f402ba319f534c1da4f4b9859461f
-
SHA1
9b159c07c6d2690fba81bc14147205a9c45198b2
-
SHA256
4a58d1633cdd14d6087276dec8fa6521559746f0e5a9a622a95775815ead1dab
-
SHA512
61a2a585405635a8f86b695e08582c21db62ae0b1f1782503f98c10b87c4214fcd483a29f1d7c4f25ed1122385e258cf142a5ca2a3f37e47103075ab56daeb0c
-
SSDEEP
384:HxeTubVVOQi4yawG5cPksgkjCmR7kf9uVPiV7bVKlsy:RQub1ivPG5fsgM7EuP2Alv
Malware Config
Extracted
xenorat
147.185.221.27
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
12362
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule static1/unpack001/xeno.exe family_xenorat -
Xenorat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/xeno.exe
Files
-
xeno.zip.zip
Password: 1
-
xeno.exe.exe windows:4 windows x86 arch:x86
Password: 1
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ