Behavioral task
behavioral1
Sample
3752-9-0x0000000000400000-0x0000000000470000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3752-9-0x0000000000400000-0x0000000000470000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
3752-9-0x0000000000400000-0x0000000000470000-memory.dmp
-
Size
448KB
-
MD5
e485e62d21c78e14eb467b2241857ebb
-
SHA1
8b32502a6e29ad593e70b3dbc909dc9e8c48da65
-
SHA256
e9b3a5e4c4ad3713b59bf703c92958a96e34ee0eb7c9b098356a6e7a448456dd
-
SHA512
d056340b2a715e3f2f330c937c47bbe238c771680bde66aee4609ae95d99ff8e509dab3e49eb634d77301c24a77c9bb85e24325377559adc74209aa204221a04
-
SSDEEP
1536:dl2Xl36xWmBcZ3R2bZfIa4bEDXIsRSo6MDO4ux7pr94Z96:dlJBcJOv4byXIgOj7Z94ZE
Malware Config
Extracted
xworm
3.1
172.111.138.90:2221
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3752-9-0x0000000000400000-0x0000000000470000-memory.dmp
Files
-
3752-9-0x0000000000400000-0x0000000000470000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 363KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ