Behavioral task
behavioral1
Sample
d3911a459d949e73cddd740a175b2096ab97a82faf6ead4d11c1c71710587428.exe
Resource
win7-20231020-en
General
-
Target
6075c495785af608be891f8a322a00d7.bin
-
Size
14KB
-
MD5
a82c1973992c533ea5eb13f25ad15b4f
-
SHA1
7eb6899e049af25373dc94b5b28fd7d8ede06255
-
SHA256
7589e39231b84168f7565ea88860d110f451863cdf13fc6afd0bee9e3c723aff
-
SHA512
984cfc40a74f94e0b4aa6479983bf5bc1bb18a8cc843afd761939e088e92b9800557487fc7f14b9e36abbbbf456a59d00ae27b1b2ac8662591134cd2272b0542
-
SSDEEP
384:U83OeWeuxHH3MRlsy0m/txPUOKS7DA3YnygH4Om4HOzlHiF:ceWlFcTsy0m1xESAInjHOzMF
Malware Config
Extracted
xworm
3.0
181.217.95.27:1024
5IZBd3TkHESwTbHY
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule static1/unpack001/d3911a459d949e73cddd740a175b2096ab97a82faf6ead4d11c1c71710587428.exe family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d3911a459d949e73cddd740a175b2096ab97a82faf6ead4d11c1c71710587428.exe
Files
-
6075c495785af608be891f8a322a00d7.bin.zip
Password: infected
-
d3911a459d949e73cddd740a175b2096ab97a82faf6ead4d11c1c71710587428.exe.exe windows:4 windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ