Behavioral task
behavioral1
Sample
042573dd1b11ace9cffe039d56a04ccef645af4ed392a9e3977c955b421e8ea2.exe
Resource
win7-20231025-en
General
-
Target
5a96b55cf1a1c7b3a905aa203760439e.bin
-
Size
15KB
-
MD5
b4e450afa5a1948633b65d4e046ae169
-
SHA1
493a449689eb9ecefab8b9050e3b765008a911d7
-
SHA256
97be34a66d00f51545a4233ae9b8e4eccc8b840d89195fde9f78e26f1a61f84c
-
SHA512
9f8efd8347f39628d42684dd4776b4db4b5c0d3ec6352af155043b94ee3663e190cb5b7c4c24f6685f116b59a6959b9851ef3a1d566e16ef39ca01e837e94714
-
SSDEEP
384:VuWITcFRzEguokyqD/ObsjHHcIJrxRbkgonOzlsf+cqA/ex8YyHyxWH:VnITcDuokFD28HHcIJ9Rgwlsfxq4O8Rj
Malware Config
Extracted
xworm
3.1
2023navidad.duckdns.org:7080
A5NU4TxiX49ZDegR
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule static1/unpack001/042573dd1b11ace9cffe039d56a04ccef645af4ed392a9e3977c955b421e8ea2.exe family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/042573dd1b11ace9cffe039d56a04ccef645af4ed392a9e3977c955b421e8ea2.exe
Files
-
5a96b55cf1a1c7b3a905aa203760439e.bin.zip
Password: infected
-
042573dd1b11ace9cffe039d56a04ccef645af4ed392a9e3977c955b421e8ea2.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ