Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 23:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
488942ee93eaea62fdd92fed0d6853a66c75b55af6952f9e2f6651c2097e4250.exe
Resource
win7-20241010-en
3 signatures
150 seconds
General
-
Target
488942ee93eaea62fdd92fed0d6853a66c75b55af6952f9e2f6651c2097e4250.exe
-
Size
252KB
-
MD5
4fb296b647e97520c1d8e794a7721d9f
-
SHA1
21c47b7e08f1b2aa8c44d9a693cc984110f7ac33
-
SHA256
488942ee93eaea62fdd92fed0d6853a66c75b55af6952f9e2f6651c2097e4250
-
SHA512
b3f07df20195fbf156f8d324f0830281c1273bd95aef077804cbf8d2ff322a6c6bf84966c99a8f9f57f3893cae7136946e5b10c8423dfbe72aeca0f7f512d511
-
SSDEEP
6144:J4cVlpkU7I2lJnqd5qaqb4Aoe7HIJ4FU2bj:Bp73v8AaK7ouHiYD
Malware Config
Extracted
Family
xenorat
C2
127.0.0.1
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral2/memory/2144-3-0x0000000001590000-0x00000000015B4000-memory.dmp family_xenorat behavioral2/memory/2144-4-0x0000000002F60000-0x0000000002F82000-memory.dmp family_xenorat -
Xenorat family