Behavioral task
behavioral1
Sample
2488-15-0x0000000000400000-0x0000000000410000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2488-15-0x0000000000400000-0x0000000000410000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2488-15-0x0000000000400000-0x0000000000410000-memory.dmp
-
Size
64KB
-
MD5
022717abcc8afa1bf8a6b5c2fd05bc31
-
SHA1
2d98b624c63ee151af44db1d2ec2b8b1cda86110
-
SHA256
802a0dbb487dc07b07020e973af8497ca5b3524fd6b49e32be6faa69ac0d8d29
-
SHA512
a8733e00da7713866cb4aa691c77292aad2a681dc128aed15a3b941ef18b19ceb5a0d7acdf07343d5e22273b02372db90b5976644f8bfc4d2c0cc72d921cb422
-
SSDEEP
768:pUw9W9heo4QMRpE17O59DGObNLFf9dP4OuhKyr3WW:f89heTK1infRFf9dP4Ou8I
Malware Config
Extracted
xworm
3.1
191.101.130.18:8252
9DiMa559vRsnPK3A
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2488-15-0x0000000000400000-0x0000000000410000-memory.dmp
Files
-
2488-15-0x0000000000400000-0x0000000000410000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ