Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 23:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
488942ee93eaea62fdd92fed0d6853a66c75b55af6952f9e2f6651c2097e4250.exe
Resource
win7-20241010-en
3 signatures
150 seconds
General
-
Target
488942ee93eaea62fdd92fed0d6853a66c75b55af6952f9e2f6651c2097e4250.exe
-
Size
252KB
-
MD5
4fb296b647e97520c1d8e794a7721d9f
-
SHA1
21c47b7e08f1b2aa8c44d9a693cc984110f7ac33
-
SHA256
488942ee93eaea62fdd92fed0d6853a66c75b55af6952f9e2f6651c2097e4250
-
SHA512
b3f07df20195fbf156f8d324f0830281c1273bd95aef077804cbf8d2ff322a6c6bf84966c99a8f9f57f3893cae7136946e5b10c8423dfbe72aeca0f7f512d511
-
SSDEEP
6144:J4cVlpkU7I2lJnqd5qaqb4Aoe7HIJ4FU2bj:Bp73v8AaK7ouHiYD
Malware Config
Extracted
Family
xenorat
C2
127.0.0.1
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/804-3-0x0000000000280000-0x00000000002A4000-memory.dmp family_xenorat behavioral1/memory/804-4-0x00000000002A0000-0x00000000002C2000-memory.dmp family_xenorat -
Xenorat family