Behavioral task
behavioral1
Sample
NEAS.a088b9f3b8936f8fc7ef1c26a30e38b6fed5a08f20aad35a69733f2b83b9bffdexe_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.a088b9f3b8936f8fc7ef1c26a30e38b6fed5a08f20aad35a69733f2b83b9bffdexe_JC.exe
-
Size
40KB
-
MD5
3f7913c73decfcac56e9f1c1bfb2779a
-
SHA1
1480393d5f36e017b5a98598742821ffb8a3ac5e
-
SHA256
a088b9f3b8936f8fc7ef1c26a30e38b6fed5a08f20aad35a69733f2b83b9bffd
-
SHA512
05e9d67ada4e6c7152e219525666acf64c3947ab73b5d601d54bb537b2d3b8c1953c9157e60a59c85b5ce60db1bfebd93d4bcfcc4808d7623fe4d931faac1205
-
SSDEEP
768:WOAixruiqRTeULSFoRd0Rp0waOsQhLOXwoE/6qs:jAiJqgZDnn1OfE/6qs
Malware Config
Extracted
xworm
2.2
septiembre2022.duckdns.org:3130
5Eyk7TkepwJVWJFv
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.a088b9f3b8936f8fc7ef1c26a30e38b6fed5a08f20aad35a69733f2b83b9bffdexe_JC.exe
Files
-
NEAS.a088b9f3b8936f8fc7ef1c26a30e38b6fed5a08f20aad35a69733f2b83b9bffdexe_JC.exe.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ