Behavioral task
behavioral1
Sample
ihatethis.exe
Resource
win7-20240903-en
General
-
Target
ihatethis.exe
-
Size
45KB
-
MD5
089061cdccbb913beba3304f3bb94bb8
-
SHA1
4874e568837c790facf5a8b74588b2cd622057fc
-
SHA256
5ae2da62c2ee0366328193100323a692e6560c469ce54a280ae81c98e7f21bbd
-
SHA512
3ac8460510cc64632ff193671e677fd1a9bad31c9dae3006028550b2ffadcd86d143b84b3c1a259bb5f694a7d8b99420b975fa62390151c0ab6281fe2d50b3a0
-
SSDEEP
768:3dhO/poiiUcjlJInG0H9Xqk5nWEZ5SbTDaBuI7CPW5t:tw+jjgnLH9XqcnW85SbTsuI1
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
5000
-
startup_name
Copilot
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule sample family_xenorat -
Xenorat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ihatethis.exe
Files
-
ihatethis.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ