Behavioral task
behavioral1
Sample
d9048e7e5185fca63822a536674effaf47f434fd8bcd74018e5da09b5a7c1469.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
d9048e7e5185fca63822a536674effaf47f434fd8bcd74018e5da09b5a7c1469.exe
Resource
win10v2004-20230621-en
General
-
Target
27d43df9fb6228ab9ec3482a528f1da6.bin
-
Size
63KB
-
MD5
f5ebbca77a59cdd6f8a5b311d27d6bcc
-
SHA1
c3ccd0803238524e2495a61762850386a6c47da7
-
SHA256
b7dda1589ba898b045aa8baa7b68eb55bca7eb6eca4174301728563f979b72dc
-
SHA512
8e09ab270c07233153b592e817fc7136f436ca5d801b75ca798fc09bab73a547ef973816ebcf0f5310fc726124edfc05dbeb8368187981390399cf939287df30
-
SSDEEP
1536:cB5d2j/FU8mttblypXf3e8JuLobi9dctwzB0hMnktGPfAeoUzjrpYKd:cB5d2uH8p/e8JEzByuzHANUzjNZ
Malware Config
Extracted
xworm
needforrat.hopto.org:7000
-
install_file
USB.exe
Signatures
-
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d9048e7e5185fca63822a536674effaf47f434fd8bcd74018e5da09b5a7c1469.exe
Files
-
27d43df9fb6228ab9ec3482a528f1da6.bin.zip
Password: infected
-
d9048e7e5185fca63822a536674effaf47f434fd8bcd74018e5da09b5a7c1469.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ