Behavioral task
behavioral1
Sample
XWorm.exe
Resource
win7-20230220-en
General
-
Target
XWorm.exe
-
Size
42KB
-
MD5
d5ce1eaefcb5a261a924a376ad1e91ae
-
SHA1
3b1eea344009649c1ffe46d0fa8e0fc63aa38d67
-
SHA256
5a8f9cca13b5eea8f7780c52ab794184586bd89820652da8af425fa6b2bafb83
-
SHA512
f332e616d821a6f47ff89c235a8bd75b7d49072cca162a71ae0808f533dc9e6be11650689197308cde8cf8c2c5cd7bb65674cb2be5812cca686fb97ee7b873ed
-
SSDEEP
768:qHbArjN0WFd8owTxxuCIF9G3RcWZ1ryB:ZnZgd0F9Oc+S
Malware Config
Extracted
xworm
even-lat.at.ply.gg:21969
cUPbD1pIGdKtWtmq
-
install_file
hacked.exe
Signatures
-
Xworm family
Files
-
XWorm.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ