Behavioral task
behavioral1
Sample
Client.jpg.exe
Resource
win7-20220812-en
General
-
Target
Client.jpg.exe
-
Size
40KB
-
MD5
6b753b9ffc4e03be898db389b2dcd99d
-
SHA1
1a9a3b40aee2d3cbe8083313a4a93d9f9c3b7aa5
-
SHA256
7ddb331b1930f9cd3fd7e6de43119db0bbcb20bf6d23b1fbb60db12b0d983c2f
-
SHA512
3df40ae788079545510357cf57b19524d86d835b99e5f1e65484261e509632b93fddbda1a2c64e08e5def9b58097cf0aff685969253ef04f19f496d6299c33c2
-
SSDEEP
768:TZ9TW8xMnq6nAnfSVoRT0Rp0wRiRsQhLOPwoE/6w:nTWTqjapRRU1OHE/6w
Malware Config
Extracted
xworm
20.219.15.124:2239
iVFQgBqManoQUHHQ
-
install_file
USB.exe
Signatures
-
Xworm family
Files
-
Client.jpg.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ