Behavioral task
behavioral1
Sample
60b96558de61115c638503dce1f7803dd3067a2c32258955e2fc8343985526d7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
60b96558de61115c638503dce1f7803dd3067a2c32258955e2fc8343985526d7.exe
Resource
win10v2004-20230915-en
General
-
Target
60b96558de61115c638503dce1f7803dd3067a2c32258955e2fc8343985526d7
-
Size
36KB
-
MD5
ff66e65d96ead8f48dd29b15590f1f72
-
SHA1
30294987866d36468702e7f81a9280c8c84944ff
-
SHA256
60b96558de61115c638503dce1f7803dd3067a2c32258955e2fc8343985526d7
-
SHA512
0c90108132e90b00f2cfd94a75aea0c489952a963365f0d45dc15f0fcddfc7fb669eccab80f75e1542525787ca459ecbe818ad899bb4a26f8b8ffa3af18c4e44
-
SSDEEP
768:svmhIiWPNToqtFKZwqzIt1VaU/FPe9l1FO9hSqTo:svmCi0owq6HaSFW9lXO9LTo
Malware Config
Extracted
xworm
3.1
51.89.158.83:7000
Txo11Z2zxHCRUkqn
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 60b96558de61115c638503dce1f7803dd3067a2c32258955e2fc8343985526d7
Files
-
60b96558de61115c638503dce1f7803dd3067a2c32258955e2fc8343985526d7.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ