Behavioral task
behavioral1
Sample
0x0007000000004e76-141.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0x0007000000004e76-141.exe
Resource
win10v2004-20231215-en
General
-
Target
0x0007000000004e76-141.dat
-
Size
375KB
-
MD5
216ef921adac2bbb51ff6331f61b19e7
-
SHA1
90c3cfc3b78daa2bfa12d26dbd765fbfd4bc510d
-
SHA256
5d717d35b913ff6d13c408f294d899ca58bb321598426eca2bea71b9e6edd9ce
-
SHA512
33b817fe0b8bcca66173dd293de6a4926b5195a990ee575a378eb4c71610dc68bb3e36b70f4498bd8a2fc9d12283b05a8fd296d2108554105f0e49fdb9e89f0c
-
SSDEEP
3072:TS0WP4rKvs3PGvbDis7GF3iO0FrEwMR94jVEUbRRYcWD/j/JJ9eGwUWNxo+K98Pn:T/KE3Ovb/KF3wIUEUVRxK/LKG9kv/
Malware Config
Extracted
xworm
3.1
-
Install_directory
%ProgramData%
-
install_file
SecurityHealthSystray.exe
-
telegram
https://api.telegram.org/bot5370417334:AAEZrEauqhTNZInhZ9_-SaapQJIi0hIvjJU
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0x0007000000004e76-141.dat
Files
-
0x0007000000004e76-141.dat.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 308KB - Virtual size: 308KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ