Behavioral task
behavioral1
Sample
2644-8-0x0000000000400000-0x000000000040E000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2644-8-0x0000000000400000-0x000000000040E000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2644-8-0x0000000000400000-0x000000000040E000-memory.dmp
-
Size
56KB
-
MD5
b4dd1d4e61f7c7bc89205f7f648ad769
-
SHA1
537851d7fea333a94e7b9308a9d624baf2936381
-
SHA256
1b081b4a91abd2fd2f2bdcecf2f01134c1ae62e285427420ca6094f12b96b53c
-
SHA512
7093b979b1395b66316a0063e6f7407b1c6ac39a283031680bdca3dd6421cd174320f6c99adaea91cca625c596d3b45a8a8d5d9940dcf062f30a98eee32b8f90
-
SSDEEP
1536:2DGkptwyZScCkU4rFUsZcB5eHF592AO95:sZUsBF592AO9
Malware Config
Extracted
xworm
3.1
xwormfresh.duckdns.org:7002
Ytep6ubSVJFcAJf5
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2644-8-0x0000000000400000-0x000000000040E000-memory.dmp
Files
-
2644-8-0x0000000000400000-0x000000000040E000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ