General

  • Target

    setup.exe

  • Size

    45KB

  • MD5

    b377774f8413ba12b5a219c8cdfaa6cc

  • SHA1

    d8a032bfdc48ce26f6251ea03e5d231fdc705037

  • SHA256

    7957c29721571c011f471853a3a8033f4af0c14c724492e87ccfeefa06aebfa2

  • SHA512

    b3f7f1c762217811883383d5ad659f0e41f74ce0055b64e3b5c2c38cf507dac2572e1f0e9deb1511dd8b1b2376e1b4bf8700c5622ad5824a93c9f50cc579b153

  • SSDEEP

    768:MMdhO/poiiUcjlJInXFH9Xqk5nWEZ5SbTDavWI7CPW53b:5w+jjgnVH9XqcnW85SbTGWIfb

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

78.56.45.239

Mutex

REPO_57638

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    1488

  • startup_name

    REPO

Signatures

  • Detect XenoRat Payload 1 IoCs
  • Xenorat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • setup.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections