Behavioral task
behavioral1
Sample
0x0006000000022e58-20.exe
Resource
win7-20231020-en
General
-
Target
0x0006000000022e58-20.dat
-
Size
38KB
-
MD5
390e5361e31cbc929e847ac6eb52fc83
-
SHA1
dbe0142f900ca40b01756f65f6059a073e776c37
-
SHA256
df501e6c611c658df919bbe959e54b1080da39511a7de35ab3b5146e32584728
-
SHA512
da8c785cf64c6d4ebfe6b4610ff51fccf5276dcfb87a5e7c4ba5dfe3ad1637ad1fc2ebff48073e5a948c2ac54dfbd97c7e60810942be80e1686a53fd892674d9
-
SSDEEP
768:ouTCWuUSucWKwJwqv2QHF89EP6dOMhg4d:ouTspTw/2MF89EP6dOMWm
Malware Config
Extracted
xworm
5.0
5.182.87.154:7000
Tb9D0Kzf4g8Fpa6f
-
Install_directory
%AppData%
-
install_file
MShelper.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0x0006000000022e58-20.dat
Files
-
0x0006000000022e58-20.dat.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ