Behavioral task
behavioral1
Sample
bRCq.exe
Resource
win7-20231020-en
General
-
Target
bRCq.exe
-
Size
31KB
-
MD5
5a96b55cf1a1c7b3a905aa203760439e
-
SHA1
46d8d6cdff843f12229b4da0dd17c2c5f6df573f
-
SHA256
042573dd1b11ace9cffe039d56a04ccef645af4ed392a9e3977c955b421e8ea2
-
SHA512
28fe949caaa9533a1bdf6100c483cc6563a2662e8eb29b8023efe08240e9e5c9c1f7aeae0fbde4a5f7b47f2b69a534dc22ad52e3b50cc1f69df0305ce96e9f82
-
SSDEEP
384:b3rVqCDweO/ace/VgFpLJPXwDs2ETIiqqR+gtFqBLTiZw/WNCvK9IkVuNxOjht/v:GzT5gePqqZFr9RUOjht/7vz
Malware Config
Extracted
xworm
3.1
2023navidad.duckdns.org:7080
A5NU4TxiX49ZDegR
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bRCq.exe
Files
-
bRCq.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ