Overview
overview
6Static
static
3X0R-USB-By...sb.exe
windows7-x64
1X0R-USB-By...sb.exe
windows10-2004-x64
1X0R-USB-By...-p.exe
windows7-x64
6X0R-USB-By...-p.exe
windows10-2004-x64
3X0R-USB-By...0r.exe
windows7-x64
1X0R-USB-By...0r.exe
windows10-2004-x64
1X0R-USB-By...bot.js
windows7-x64
1X0R-USB-By...bot.js
windows10-2004-x64
1X0R-USB-By...t.html
windows7-x64
1X0R-USB-By...t.html
windows10-2004-x64
1X0R-USB-By...as.bat
windows7-x64
1X0R-USB-By...as.bat
windows10-2004-x64
1X0R-USB-By...or.bat
windows7-x64
1X0R-USB-By...or.bat
windows10-2004-x64
1X0R-USB-By...or.exe
windows7-x64
1X0R-USB-By...or.exe
windows10-2004-x64
1X0R-USB-By...r.html
windows7-x64
1X0R-USB-By...r.html
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
X0R-USB-By-Virus/Release/scofield-usb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
X0R-USB-By-Virus/Release/scofield-usb.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
X0R-USB-By-Virus/Release/x0r-p.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
X0R-USB-By-Virus/Release/x0r-p.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
X0R-USB-By-Virus/Release/x0r.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
X0R-USB-By-Virus/Release/x0r.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
X0R-USB-By-Virus/bot.js
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
X0R-USB-By-Virus/bot.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
X0R-USB-By-Virus/bot.html
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
X0R-USB-By-Virus/bot.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
X0R-USB-By-Virus/xor/Release/as.bat
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
X0R-USB-By-Virus/xor/Release/as.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
X0R-USB-By-Virus/xor/Release/xor.bat
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
X0R-USB-By-Virus/xor/Release/xor.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
X0R-USB-By-Virus/xor/Release/xor.exe
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
X0R-USB-By-Virus/xor/Release/xor.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
X0R-USB-By-Virus/xor/xor.html
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
X0R-USB-By-Virus/xor/xor.html
Resource
win10v2004-20230220-en
General
-
Target
X0R-USB-By-Virus.rar
-
Size
227KB
-
MD5
a2c135f08c7d3dd9a10207c0b8afb9ba
-
SHA1
95457470852d6956911b08c4a6b47619dc410127
-
SHA256
59d8caf4e3795ce93bf973ee4cbd04fc09774c003bf37fcfa3e072c1ec05207f
-
SHA512
67ca4ad5ff32ffdc44e552be08ca427204197f0ff822b88665ade64278483e59d462fb1a7ebdb3b8422e1646f282573607b12b5680c832df996c2fed75ac0cf7
-
SSDEEP
6144:IikhkdBMd1vvqDTY9WP0NE6hif3Gy2NoNPvWojpfLsSbG:IrhkdBWUYsPEDifWyEoNrjpfL5G
Malware Config
Signatures
-
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
resource unpack001/X0R-USB-By-Virus/Release/scofield-usb.exe unpack001/X0R-USB-By-Virus/Release/x0r-p.exe unpack001/X0R-USB-By-Virus/Release/x0r.exe unpack001/X0R-USB-By-Virus/xor/Release/xor.exe
Files
-
X0R-USB-By-Virus.rar.rar
Password: infected
-
X0R-USB-By-Virus/Lastmain.c
-
X0R-USB-By-Virus/Release/scofield-usb.exe.exe windows x86
Password: infected
493fadfe59ec1ccb667d3415d5357692
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
LoadLibraryA
lstrlenA
GetCurrentProcess
GetProcAddress
lstrcmpiA
CloseHandle
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 358B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
X0R-USB-By-Virus/Release/x0r-p.exe.exe windows x86
Password: infected
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.YARAB Size: 102KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
X0R-USB-By-Virus/Release/x0r.exe.exe windows x86
Password: infected
493fadfe59ec1ccb667d3415d5357692
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
LoadLibraryA
lstrlenA
GetCurrentProcess
GetProcAddress
lstrcmpiA
CloseHandle
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 358B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
X0R-USB-By-Virus/bot.dsp
-
X0R-USB-By-Virus/bot.dsw
-
X0R-USB-By-Virus/bot.ncb
-
X0R-USB-By-Virus/bot.opt.js
-
X0R-USB-By-Virus/bot.plg.html
-
X0R-USB-By-Virus/main-OK.c
-
X0R-USB-By-Virus/main.c
-
X0R-USB-By-Virus/tcp.h
-
X0R-USB-By-Virus/xor/Release/as.bat
-
X0R-USB-By-Virus/xor/Release/as.h
-
X0R-USB-By-Virus/xor/Release/as.txt
-
X0R-USB-By-Virus/xor/Release/str-OK.h
-
X0R-USB-By-Virus/xor/Release/str.h
-
X0R-USB-By-Virus/xor/Release/str.txt
-
X0R-USB-By-Virus/xor/Release/xor.bat
-
X0R-USB-By-Virus/xor/Release/xor.exe.exe windows x86
Password: infected
1f00c3af08357994bdbe71fdf562c0ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetLastError
GetFileAttributesA
HeapFree
CloseHandle
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
HeapAlloc
SetFilePointer
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
ReadFile
CreateFileA
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
MultiByteToWideChar
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEndOfFile
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
X0R-USB-By-Virus/xor/xor.c
-
X0R-USB-By-Virus/xor/xor.dsp
-
X0R-USB-By-Virus/xor/xor.plg.html
-
X0R-USB-By-Virus/zip.cpp
-
X0R-USB-By-Virus/zip.h