Click to jump to signature section
Source: 8q8C8bQJRZ.exe | Malware Configuration Extractor: XenoRAT {"C2 url": "176.65.139.51", "Mutex Name": "Xeno_rat_nd8912d", "Install Folder": "nothingset"} |
Source: 8q8C8bQJRZ.exe | Virustotal: Detection: 70% | Perma Link |
Source: 8q8C8bQJRZ.exe | ReversingLabs: Detection: 75% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.8% probability |
Source: 8q8C8bQJRZ.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Malware configuration extractor | URLs: 176.65.139.51 |
Source: global traffic | TCP traffic: 192.168.2.4:49731 -> 176.65.139.51:6969 |
Source: Joe Sandbox View | ASN Name: PALTEL-ASPALTELAutonomousSystemPS PALTEL-ASPALTELAutonomousSystemPS |
Source: unknown | TCP traffic detected without corresponding DNS query: 176.65.139.51 |
Source: unknown | TCP traffic detected without corresponding DNS query: 176.65.139.51 |
Source: unknown | TCP traffic detected without corresponding DNS query: 176.65.139.51 |
Source: unknown | TCP traffic detected without corresponding DNS query: 176.65.139.51 |
Source: unknown | TCP traffic detected without corresponding DNS query: 176.65.139.51 |
Source: unknown | TCP traffic detected without corresponding DNS query: 176.65.139.51 |
Source: unknown | TCP traffic detected without corresponding DNS query: 176.65.139.51 |
Source: unknown | TCP traffic detected without corresponding DNS query: 176.65.139.51 |
Source: unknown | TCP traffic detected without corresponding DNS query: 176.65.139.51 |
Source: unknown | TCP traffic detected without corresponding DNS query: 176.65.139.51 |
Source: unknown | TCP traffic detected without corresponding DNS query: 176.65.139.51 |
Source: unknown | TCP traffic detected without corresponding DNS query: 176.65.139.51 |
Source: 8q8C8bQJRZ.exe, type: SAMPLE | Matched rule: Xeno RAT is an open-source RAT, used by Kimsuky in January 2024 Author: Sekoia.io |
Source: 0.0.8q8C8bQJRZ.exe.780000.0.unpack, type: UNPACKEDPE | Matched rule: Xeno RAT is an open-source RAT, used by Kimsuky in January 2024 Author: Sekoia.io |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Code function: 0_2_00E02327 | 0_2_00E02327 |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Code function: 0_2_00E00B11 | 0_2_00E00B11 |
Source: 8q8C8bQJRZ.exe, 00000000.00000000.1804953226.000000000078E000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamesys64.exe: vs 8q8C8bQJRZ.exe |
Source: 8q8C8bQJRZ.exe, 00000000.00000002.3052855401.0000000000ECE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs 8q8C8bQJRZ.exe |
Source: 8q8C8bQJRZ.exe | Binary or memory string: OriginalFilenamesys64.exe: vs 8q8C8bQJRZ.exe |
Source: 8q8C8bQJRZ.exe, type: SAMPLE | Matched rule: rat_win_xeno_rat author = Sekoia.io, description = Xeno RAT is an open-source RAT, used by Kimsuky in January 2024, creation_date = 2024-02-09, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/moom825/xeno-rat/tree/main/xeno%20rat%20client, id = 4be1ff07-8180-42a8-9f51-b5e17bf23442 |
Source: 0.0.8q8C8bQJRZ.exe.780000.0.unpack, type: UNPACKEDPE | Matched rule: rat_win_xeno_rat author = Sekoia.io, description = Xeno RAT is an open-source RAT, used by Kimsuky in January 2024, creation_date = 2024-02-09, classification = TLP:CLEAR, version = 1.0, reference = https://github.com/moom825/xeno-rat/tree/main/xeno%20rat%20client, id = 4be1ff07-8180-42a8-9f51-b5e17bf23442 |
Source: classification engine | Classification label: mal84.troj.evad.winEXE@1/0@0/1 |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Mutant created: NULL |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Mutant created: \Sessions\1\BaseNamedObjects\Xeno_rat_nd8912d-admin |
Source: 8q8C8bQJRZ.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: 8q8C8bQJRZ.exe | Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83% |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: 8q8C8bQJRZ.exe | Virustotal: Detection: 70% |
Source: 8q8C8bQJRZ.exe | ReversingLabs: Detection: 75% |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: 8q8C8bQJRZ.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: 8q8C8bQJRZ.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: 8q8C8bQJRZ.exe, DllHandler.cs | .Net Code: DllNodeHandler System.Reflection.Assembly.Load(byte[]) |
Source: 8q8C8bQJRZ.exe, DllHandler.cs | .Net Code: DllNodeHandler |
Source: 8q8C8bQJRZ.exe | Static PE information: 0xB6F61BA2 [Sat Apr 9 13:44:02 2067 UTC] |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Code function: 0_2_00E036D7 push ebx; iretd | 0_2_00E036DA |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Memory allocated: E00000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Memory allocated: 2B50000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Memory allocated: 2A60000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Window / User API: threadDelayed 2433 | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Window / User API: threadDelayed 7419 | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe TID: 6440 | Thread sleep time: -27670116110564310s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe TID: 4296 | Thread sleep count: 2433 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe TID: 1020 | Thread sleep count: 7419 > 30 | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | System information queried: CurrentTimeZoneInformation | Jump to behavior |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: 8q8C8bQJRZ.exe, 00000000.00000002.3052855401.0000000000F33000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Memory allocated: page read and write | page guard | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Queries volume information: C:\Users\user\Desktop\8q8C8bQJRZ.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\8q8C8bQJRZ.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |
Source: Yara match | File source: 8q8C8bQJRZ.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.8q8C8bQJRZ.exe.780000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.1804936159.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 8q8C8bQJRZ.exe PID: 3868, type: MEMORYSTR |
Source: Yara match | File source: 8q8C8bQJRZ.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.8q8C8bQJRZ.exe.780000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.1804936159.0000000000782000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 8q8C8bQJRZ.exe PID: 3868, type: MEMORYSTR |