General
-
Target
Tutorial Files(1).txt
-
Size
2KB
-
Sample
250408-pjvpxatqv5
-
MD5
5600477fbd3d6bde63f31d2ceaf95d5a
-
SHA1
b2e700cad0d80e19ce84750ba55ca387f0bd4bf3
-
SHA256
6025d9decad215703487c83f75ccf9d5f528bed582ab809ddd117e372424dc72
-
SHA512
d8586a1daa7a9d73d1ee3cf72ac62f799ae687107ffcb83a7b6d766d6ed15b6ea46ab7f013a5461701f4af4f4aedb2391d3759030f3c0f26ba868efd3cf0053f
Static task
static1
Behavioral task
behavioral1
Sample
Tutorial Files(1).js
Resource
win11-20250314-en
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
Tutorial Files(1).txt
-
Size
2KB
-
MD5
5600477fbd3d6bde63f31d2ceaf95d5a
-
SHA1
b2e700cad0d80e19ce84750ba55ca387f0bd4bf3
-
SHA256
6025d9decad215703487c83f75ccf9d5f528bed582ab809ddd117e372424dc72
-
SHA512
d8586a1daa7a9d73d1ee3cf72ac62f799ae687107ffcb83a7b6d766d6ed15b6ea46ab7f013a5461701f4af4f4aedb2391d3759030f3c0f26ba868efd3cf0053f
-
Detect XenoRat Payload
-
Xenorat family
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-