Behavioral task
behavioral1
Sample
cf479eb23e6252acce467b8cfc14182ac725659ef8fa5c28b9271a067756955c.exe
Resource
win7-20230831-en
General
-
Target
9ed8f212c10771fd7976c0524a3840e8.bin
-
Size
38KB
-
MD5
34e375011104a4db4d30e4c6cb35ae8c
-
SHA1
4b810a64797c429f8502169f6289d66fe9802cf7
-
SHA256
77425b9d0e90ccdc5609ff7521a30553ecab74abdd4124cf4717a8092e257bf1
-
SHA512
ec962e4b8a8967279ad9a044a0e017fb12b2066c8ce2a1a8b25499b1c5732f97df06969a8d5cfbda4c7dc463272618d00c8fe80af2d482b00cbd5325d7c9505d
-
SSDEEP
768:B1+Ag3E9DhxNlBfkk278ZDyd0GJT2TNTK7reC2UuuHxW0isFsd4:X+AgAxN4kQ8od9JT2JErAUBHU0iF4
Malware Config
Extracted
xworm
3.1
0.tcp.ap.ngrok.io:14440
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule static1/unpack001/cf479eb23e6252acce467b8cfc14182ac725659ef8fa5c28b9271a067756955c.exe family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/cf479eb23e6252acce467b8cfc14182ac725659ef8fa5c28b9271a067756955c.exe
Files
-
9ed8f212c10771fd7976c0524a3840e8.bin.zip
Password: infected
-
cf479eb23e6252acce467b8cfc14182ac725659ef8fa5c28b9271a067756955c.exe.exe windows:4 windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ