Behavioral task
behavioral1
Sample
32cb912081b7fdca0666a281eeaae8220ae237dc1b5f33e651637646bc598d6b.exe
Resource
win7-20221111-en
General
-
Target
32cb912081b7fdca0666a281eeaae8220ae237dc1b5f33e651637646bc598d6b
-
Size
40KB
-
MD5
97af9a31a7a19c542001dbc45a8b6cbe
-
SHA1
9c3e1dd795995d926e4fdafcf1257e3059b5a04b
-
SHA256
32cb912081b7fdca0666a281eeaae8220ae237dc1b5f33e651637646bc598d6b
-
SHA512
3a9352063a9f031b5a3422cc23b5e5457994621104deaf6f9ad8210979b61b2e96136163670e92534c55da31215002bd098ff39a64749574d595bcce1f1253ad
-
SSDEEP
768:+76uLjeYjfNq1WcdSBz0RpfzWsQhLOt+ekf:O6Utbcfq1Osekf
Malware Config
Extracted
xworm
microsoft2.ddns.net:7000
MlDCZkj7fy4WJpJP
-
install_file
USB.exe
Signatures
-
Xworm family
Files
-
32cb912081b7fdca0666a281eeaae8220ae237dc1b5f33e651637646bc598d6b.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ