Report Overview
Domain Summary
Domain / FQDN | Rank | Registered | First Seen | Last Seen | Sent | Received | IP |
---|---|---|---|---|---|---|---|
xeno-executor.org | unknown | 2025-01-16 | 2025-01-20 | 2025-01-20 | 491 B | 5.0 MB | ![]() |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
Files detected
URL
xeno-executor.org/Xeno-v1.1.3-x64.zip
IP
104.21.21.211
ASN
#13335 CLOUDFLARENET
File type
Zip archive data, at least v1.0 to extract, compression method=store
Size
5.0 MB (5001066 bytes)
Hash
520cabdf6c80e269166844c43015a77b
cf0f24a0d2f1c5ccbc3f7076363976809d72cf51
Archive (51)
Filename | Md5 | File type | ||||||
---|---|---|---|---|---|---|---|---|
api-ms-win-crt-convert-l1-1-0.dll | c8dbf0ca88facfe87899168a7f7db52c
| PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections | ||||||
api-ms-win-crt-filesystem-l1-1-0.dll | 42a2a95f1bb940d01f55eb1674a81fe2
| PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections | ||||||
api-ms-win-crt-heap-l1-1-0.dll | 98da186fd7d7873c164a51c5d7b77f1a
| PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections | ||||||
api-ms-win-crt-locale-l1-1-0.dll | ff48b107b2449a647c64baabd49408a1
| PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections | ||||||
api-ms-win-crt-math-l1-1-0.dll | e10e077bb06209aedd0d0d378c758f73
| PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections | ||||||
api-ms-win-crt-runtime-l1-1-0.dll | f91e1ff896b5616919ac97c7095c513e
| PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections | ||||||
api-ms-win-crt-stdio-l1-1-0.dll | 429c26ed27a026442f89c95ff16ce8c2
| PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections | ||||||
api-ms-win-crt-string-l1-1-0.dll | 0f593e50be4715aa8e1f6eb39434edd5
| PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections | ||||||
test.txt | 649d2f9bbd50814244547e4e140a95e0 | ASCII text, with no line terminators | ||||||
index.html | 001dcbb8f41cdcbf9b4d1e3a0ed4b2d2 | HTML document, Unicode text, UTF-8 text, with very long lines (61271), with CRLF line terminators | ||||||
workerMain.js | d0ac5294c58e523cddf25bc6d785fa48 | JavaScript source, ASCII text, with very long lines (1119), with CRLF line terminators | ||||||
lua.js | eebda1fdd970433750c115eae2f03865 | JavaScript source, ASCII text, with CRLF line terminators | ||||||
editor.main.css | 23c7db6e12f6454ef6e7fb98d17924d8 | ASCII text, with very long lines (65249), with CRLF line terminators | ||||||
editor.main.js | 2dc0068cdbc03ce43a75ab0b2df664e2 | JavaScript source, Unicode text, UTF-8 text, with very long lines (65245), with CRLF line terminators | ||||||
editor.main.nls.de.js | d1fd2fb756c73970b9c5e0ba07bff708 | Unicode text, UTF-8 text, with very long lines (16089), with CRLF line terminators | ||||||
editor.main.nls.es.js | 36f546b28ca17ece9f8eb9bcf8344e13 | Unicode text, UTF-8 text, with very long lines (16082), with CRLF line terminators | ||||||
editor.main.nls.fr.js | 1a29080733878dd44e0c118e84cd0c39 | Unicode text, UTF-8 text, with very long lines (16773), with CRLF line terminators | ||||||
editor.main.nls.it.js | 18e88f58301ad5ae926204507ab99c6b | Unicode text, UTF-8 text, with very long lines (17192), with CRLF line terminators | ||||||
editor.main.nls.ja.js | 3bf851cc70f515cbbe1d39da93e4f041 | Unicode text, UTF-8 text, with very long lines (7783), with CRLF line terminators | ||||||
editor.main.nls.js | e871d4d9539c26d7d2bf32801ebdecf0 | Unicode text, UTF-8 text, with very long lines (13654), with CRLF line terminators | ||||||
editor.main.nls.ko.js | 60fcd422ac97a1b645ff48cb6928f7af | Unicode text, UTF-8 text, with very long lines (8116), with CRLF line terminators | ||||||
editor.main.nls.ru.js | 6e7d5b984917b00f131c47473ce2b866 | Unicode text, UTF-8 text, with very long lines (16153), with CRLF line terminators | ||||||
editor.main.nls.zh-cn.js | 05e49314cf801f5d3992b55243690ea7 | Unicode text, UTF-8 text, with very long lines (5836), with CRLF line terminators | ||||||
editor.main.nls.zh-tw.js | becbf441d95b0bc1565faf47ce9de373 | Unicode text, UTF-8 text, with very long lines (5745), with CRLF line terminators | ||||||
loader.js | bc15bb48d4d5c60ce7f16819f4d988c4 | JavaScript source, ASCII text, with very long lines (1023), with CRLF line terminators | ||||||
libcrypto-3-x64.dll | 54ca3e6afcb3c57c7914c0856d779f2a | PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 8 sections | ||||||
libssl-3-x64.dll | d66acb55a9f095a24865c9d883f96fd1 | PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 8 sections | ||||||
Microsoft.Web.WebView2.Core.dll | b037ca44fd19b8eedb6d5b9de3e48469 | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | ||||||
Microsoft.Web.WebView2.WinForms.dll | 8153423918c8cbf54b44acec01f1d6c2 | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | ||||||
Microsoft.Web.WebView2.Wpf.dll | 4a292c5c2abf1aab91dee8eecafe0ab6 | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | ||||||
msvcp140.dll | 4d157073a891d0832b9b05fb8aca73a8 | PE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections | ||||||
Newtonsoft.Json.dll | adf3e3eecde20b7c9661e9c47106a14a | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections | ||||||
WebView2Loader.dll | 8f2648cd543236ef1b4856715731e069
| PE32+ executable (DLL) (console) Aarch64, for MS Windows, 7 sections | ||||||
WebView2Loader.dll | c5f0c46e91f354c58ecec864614157d7
| PE32+ executable (DLL) (console) x86-64, for MS Windows, 10 sections | ||||||
WebView2Loader.dll | 9d7744e15bb8e3d005079b18979c8544
| PE32 executable (DLL) (console) Intel 80386, for MS Windows, 6 sections | ||||||
Dex.lua | e37374a8aa47cf8ac6d56901436e199f | JavaScript source, ASCII text, with very long lines (467), with CRLF line terminators | ||||||
Infinite Yield.lua | a8c69257b0db73b3e531d62cd872bc8b | JavaScript source, Unicode text, UTF-8 text, with CRLF line terminators | ||||||
Sine Wave.lua | 0bbb2aebfadc119226992045dcaa30b4 | JavaScript source, ASCII text, with CRLF line terminators | ||||||
Spinning Donut.lua | 967403f0ecb43917e841a085851b732d | JavaScript source, ASCII text, with CRLF line terminators | ||||||
UNCCheckEnv.lua | b76726d10354343d9af5c268e40b47c4 | JavaScript source, Unicode text, UTF-8 text, with CRLF line terminators | ||||||
vcruntime140.dll | 943fc74c2e39fe803d828ccfa7e62409 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 8 sections | ||||||
vcruntime140_1.dll | 05052be2c36166ff9646d7d00bb7413f | PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections | ||||||
deps_version.dat | 7ef3ab2f25955388d147b6797d04387c | ASCII text | ||||||
rbx_api.dat | c31c192974d091badb971fde16825795 | JSON text data | ||||||
rbx_rmd.dat | b4839a4dd884609ab4a0100bc1bb74d6 | ASCII text, with CRLF line terminators | ||||||
IY_FE.iy | 291d5636a434c4f1ceb0f3f776c2a51f | JSON text data | ||||||
Xeno.dll | 66e8a6978c77e6b2f390f33d25bf7f01
| PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections | ||||||
Xeno.exe | f0d6a8ef8299c5f15732a011d90b0be1
| PE32+ executable (GUI) x86-64, for MS Windows, 6 sections | ||||||
XenoUI.deps.json | f264dff8b12b6341b6bb97f9cea46324 | JSON text data | ||||||
XenoUI.dll | 8a0f97c09c4a713e0b2679e90ced44d4
| PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections | ||||||
XenoUI.runtimeconfig.json | e0f6f18f9b152bc2d8c710b0214805d6 | JSON text data |
Detections
Analyzer | Verdict | Alert |
---|---|---|
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
VirusTotal | suspicious |
JavaScript (0)
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
xeno-executor.org/Xeno-v1.1.3-x64.zip | ![]() | 200 OK | 5.0 MB | |||||||
Detections
HTTP Headers
| ||||||||||