Analysis
-
max time kernel
129s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 12:13
Behavioral task
behavioral1
Sample
sigmacode.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
sigmacode.exe
-
Size
45KB
-
MD5
4fbef0899b35ae09ba0d601cba569e54
-
SHA1
49e1f7939dc5ad245a26f5c5762bec1d4730f797
-
SHA256
3f2a0056e6fe0575d5823732d1e4549ee0c3cf9d196637b8589a0432a46f59e7
-
SHA512
bcd3ae5fb14bf7f3d49520afa00c47360ddd178bbc1b8fb8490b18280495a708efc23afb6b08693c71b7cad410b6241cf545448103d0afaf9c649806376b5908
-
SSDEEP
768:KdhO/poiiUcjlJInvbqmH9Xqk5nWEZ5SbTDaxWI7CPW5h:sw+jjgnzH9XqcnW85SbTgWIZ
Malware Config
Extracted
Family
xenorat
C2
issue-vernon.gl.at.ply.gg
Mutex
deptrainhatvutru
Attributes
-
delay
5000
-
install_path
nothingset
-
port
7560
-
startup_name
nothingset
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral2/memory/4996-1-0x00000000009E0000-0x00000000009F2000-memory.dmp family_xenorat -
Xenorat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sigmacode.exe