Behavioral task
behavioral1
Sample
2152-773-0x0000000000990000-0x00000000009A4000-memory.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2152-773-0x0000000000990000-0x00000000009A4000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
2152-773-0x0000000000990000-0x00000000009A4000-memory.dmp
-
Size
80KB
-
MD5
e13810b79f18da8fe35d89e8c53abe52
-
SHA1
601a2e5d789e1aa9e8ed643878c02b66062b107c
-
SHA256
76172f3f0cb62ca48be258ebb23a8ffc5d844eec6ca0c24fbdc425da77043a1e
-
SHA512
4fa2492a1bc32c4a61a7b708947d073cdbd87f5bf2dfe6e1c05f3255b8175a5965c32b1bc5d8c5f4f70510652a158906ed83c1de1e681a7eb0c024d914e6f4ef
-
SSDEEP
1536:Z5aQb11rNvYKf9UOHimHjUt4kbiidEhS6AOjmAah:ZhTZbf9UOHiOj24kbiH8Ojlah
Malware Config
Extracted
xworm
5.0
157.254.223.19:8000
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6440201303:AAFWK8ktoaf4BhwoOKOZW85fYC_jmgFy5fw/sendMessage?chat_id=1734472346
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2152-773-0x0000000000990000-0x00000000009A4000-memory.dmp
Files
-
2152-773-0x0000000000990000-0x00000000009A4000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ