Behavioral task
behavioral1
Sample
niggers.exe
Resource
win10v2004-20230220-en
General
-
Target
niggers.exe
-
Size
41KB
-
MD5
54a19107ca1b08e88b2f8fab15f09b46
-
SHA1
df6e71f3820ad1a44c4a005a463772fb80e8a965
-
SHA256
0bc9e53567246aa089ee95acd725e29b1fdce8e03bf7f999561469e248a3578a
-
SHA512
37227a6fa2afc3370dd0efd34bd52cfa749e4b5d9990339b763bee6fa0dca8a33a442a4358cfcf47a40d7fc9876ce2158ccd43415c6b830e531344fe854c4944
-
SSDEEP
768:aeUBoo9ja78F3VwXWTTjVVSDk9lYAT9hKdQ9jGk+FRBT2:aBHA7alwXcXSAYKGQ9yjvT2
Malware Config
Extracted
xworm
127.0.0.1:7000
2MryewWN7r059u6i
-
install_file
USB.exe
Signatures
-
Xworm family
Files
-
niggers.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ