Behavioral task
behavioral1
Sample
CrackedLoader.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
CrackedLoader.exe
Resource
win10v2004-20230220-en
General
-
Target
CrackedLoader.exe
-
Size
88KB
-
MD5
f2da17a717b51de8e24e686cbc91d400
-
SHA1
be16c4dcd7ffb0ccf2638dacaff92eeb51afe151
-
SHA256
566cc67f0734ddb96fb21a6a831531020eaafdd760e6555634f56662812aa6d2
-
SHA512
4438e293f1d86c2d8c36f7d0998090157db86d239b12f443a75642429408316b84cc231bb83b305cf437781ca8913ebe78f7c956f2044d81fa1f22d92887d892
-
SSDEEP
1536:haJsfnqax90ZTrv/drpAB3NBIrjbCiK3jVifR+6yK5ZrOWajnyqkK:hekRyhdNs3nwjbCihCK5ZrOWwQK
Malware Config
Extracted
xworm
richard-western.at.ply.gg:50527
-
install_file
USB.exe
Signatures
-
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource CrackedLoader.exe
Files
-
CrackedLoader.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ