Behavioral task
behavioral1
Sample
3020-95-0x0000018B59450000-0x0000018B59462000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
3020-95-0x0000018B59450000-0x0000018B59462000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
3020-95-0x0000018B59450000-0x0000018B59462000-memory.dmp
-
Size
72KB
-
MD5
e330a969c7f34628160905b63aefce87
-
SHA1
ea22781157e3bb9507579d820c98718561c6c907
-
SHA256
1861de79bc953c3b30e9e2e9eba9215da80b0c5a9b8d9017b80960a40ab8cb52
-
SHA512
20ae37531d460605d25223911bc845db560c1c7f3a80a5254a7c113de8069f55b0d10fe269ab1049b33deb0dfa9a7ff675b05001ecd80d6336d2c8b84e3b4328
-
SSDEEP
768:+8mBrqddoRnKbaswBjpIE9j9bfnBwqi6rOWhPnFoeUsQ4kv:HCqVSn9bPBo6rOW1FtrQ4kv
Malware Config
Extracted
xworm
3.1
193.161.193.99:61360
iKU5R04rJjg81sVB
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3020-95-0x0000018B59450000-0x0000018B59462000-memory.dmp
Files
-
3020-95-0x0000018B59450000-0x0000018B59462000-memory.dmp.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ