Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20221111-en
General
-
Target
Client.exe
-
Size
40KB
-
MD5
a881effab5bc8900bd07d639d00c7e12
-
SHA1
80cbd3272c1413b00ac7073a6204440c2e29fe4e
-
SHA256
2f5304b657b07839525d7d3ef50f192cde2bcab15b8fde2a6ff264f6412290df
-
SHA512
e5e607e461cbad98ef713fef484ec118a9475db63df344fb736cd98625d18dcefa47687f5fbef844163b2730b09e9764071c8e2035b5a9483e79e7f1b94e8c6f
-
SSDEEP
768:WI1b0LN5qw4+nfSVoRT0Rp0wRULsQhLOrwoE/6q:V1bCq+apRRc1OTE/6q
Malware Config
Extracted
xworm
3.7.61.252:2339
1BTaio822onRVv7N
-
install_file
USB.exe
Signatures
-
Xworm family
Files
-
Client.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ