Behavioral task
behavioral1
Sample
XWore.exe
Resource
win7-20231020-en
General
-
Target
XWore.exe
-
Size
30KB
-
MD5
3fe54bfffc7a2c8b2b110353db4339c1
-
SHA1
c1efe869ea6915046b6f35bcee7e933a0cdeaed4
-
SHA256
3ff76fecfadb44a659b996e2eea12c51449e2c91fe318dc68078203c102d601a
-
SHA512
d871c30b2bbb85e41be8fc4a243c9cab10d686dfd99043032a5a1a51c082b5a0287687188df75b0a778a7effe70b423dc3c3087bae25231c7c55327af17d8741
-
SSDEEP
768:2rhO5b13hdwzxLy3os0O/dMRvCnQmIDUu0ti3nCj:IcZ6eh6gQVkzj
Malware Config
Extracted
njrat
0.7d
MyBot
121.185.6.149:6667
3835569585b779d1906a0dacea0d2ff0
-
reg_key
3835569585b779d1906a0dacea0d2ff0
-
splitter
Y262SUCZ4UJJ
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XWore.exe
Files
-
XWore.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ