Behavioral task
behavioral1
Sample
1976-11-0x00000000009D0000-0x00000000009FE000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1976-11-0x00000000009D0000-0x00000000009FE000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
1976-11-0x00000000009D0000-0x00000000009FE000-memory.dmp
-
Size
184KB
-
MD5
10b030a439dedc4b473dd6f15e2e1670
-
SHA1
3474324dfed265a579e55417ad59bcb823adfc9f
-
SHA256
3dc539c9737d32b815cfde9bac1bd0449d071b9cc9cd0176e88eadd6d162dc6e
-
SHA512
70948c75ff33111b91ea6f975c74373808be4ad89285e690cc5467fd94c578fb6e71172521d6aebf09fc2b18f7d82cf172e5dda2cf5092d4cafcdd82a4352714
-
SSDEEP
3072:U6jqI2Jg4s9/5bz1C7BvhoqIOWWrJEWZO4Jg4s9/5bz1C7BvT+QqIOWWr9H:WIiA/5bJC1ja+A/5bJC1UN
Malware Config
Extracted
xworm
3.1
-
Install_directory
%ProgramData%
-
telegram
https://api.telegram.org/bot6268868985:AAH9dZaP5ho85P3BVfYfThYVShyDLP_r9BU
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1976-11-0x00000000009D0000-0x00000000009FE000-memory.dmp
Files
-
1976-11-0x00000000009D0000-0x00000000009FE000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ