Behavioral task
behavioral1
Sample
1256-918-0x0000000000560000-0x0000000000574000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1256-918-0x0000000000560000-0x0000000000574000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
1256-918-0x0000000000560000-0x0000000000574000-memory.dmp
-
Size
80KB
-
MD5
f81d0b6367a8b08a2189f3a0b8deab28
-
SHA1
1aba5148839f5f068fe36613b4d6728b5f4bd592
-
SHA256
bc948401577ef9615e2092bb83420300d0a45f4328d44d02eacc63bd9157cbfe
-
SHA512
77fc47940064409e2c1217ef2ca42ca59c0919d741ca24d399c19bd504db3940888a8c011c1cfde4e31065eb84169e6c110fb5476485c71d3fb9367ece3d2153
-
SSDEEP
1536:M5aQb11rNvYKf9UOHimHjUt4kbiidEhS6AOjmAa0:MhTZbf9UOHiOj24kbiH8Ojla0
Malware Config
Extracted
xworm
5.0
157.254.223.19:8000
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6440201303:AAFWK8ktoaf4BhwoOKOZW85fYC_jmgFy5fw/sendMessage?chat_id=1734472346
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1256-918-0x0000000000560000-0x0000000000574000-memory.dmp
Files
-
1256-918-0x0000000000560000-0x0000000000574000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ