Static task
static1
Behavioral task
behavioral1
Sample
Xworm v3.0 Cracked By Escanor.exe
Resource
win7-20230712-en
General
-
Target
Xworm v3.0 Cracked By Escanor.exe
-
Size
11.7MB
-
MD5
5e231f3c0aa2513c07079488ae303047
-
SHA1
58a0b61492e8b81c6968bc8668fc61080f3fac21
-
SHA256
a079eb1d1133c5813e1f1a990b5298a9f24a3fb4e4dd37cb9ccdb00e8dfaea20
-
SHA512
a3858807b8a31951a23fbcb1a3836d2545b5fbf1904e8462a8d580bf1b5a069ee90135b9893bbeb33df9dc463bca5b8720019f793c0a89ffa8e54a0a86ebc21f
-
SSDEEP
196608:6xOVfvUsKRxGe56E+Td9Wo0IUoOzlkoJghWbh66IJ3Febk6+SRwsfAzxfUL7E:6xufwse5rc3WXXioqhih66IbRzSlAz94
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Xworm v3.0 Cracked By Escanor.exe
Files
-
Xworm v3.0 Cracked By Escanor.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 11.6MB - Virtual size: 11.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ