General

  • Target

    Client.exe

  • Size

    112KB

  • MD5

    ae4d2ce16c802796d3b052c98f380df0

  • SHA1

    a2744daae12f133c6b6be3e366ac90947bbed748

  • SHA256

    b56aa51e6c3e6d8e4ed7a15a1480033741ee27d2e35957be742f9d799ad828f7

  • SHA512

    bfb5225d6411c913ec098ff70311302dfff76f52addb527e2790b8b766ada513af453bad0f5d3f8caa7993558fe7ebc7a2bb5ad33c5a5ad260dde6f039fe842f

  • SSDEEP

    768:0dhO/poiiUcjlJInT7ElmH9Xqk5nWEZ5SbTDawuI7CPW5aZLKEe+eJaS:Ow+jjgnPElmH9XqcnW85SbT9uIyZzS

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

178.83.80.11

Mutex

WinStart

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4782

  • startup_name

    WinStart

Signatures

  • Detect XenoRat Payload 1 IoCs
  • Xenorat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Client.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections