General
-
Target
Nursultan.exe
-
Size
336KB
-
MD5
11ea5b76e048445966e926c28a2875c8
-
SHA1
86cceae0f4107c4a7a4a43cf109b259c6c416083
-
SHA256
131caa81db3d4289abcead59e78047a30e587b3672269aafbee6c69773f06132
-
SHA512
50a2df57d0ab34570884ec4b03cb6f76828f7a113712a84908112df31a72d79a80924ccbad0ffbe01125e232ef4d5a57141aee3abe8a4b8abfb24aafef22ce50
-
SSDEEP
3072:nvrQkJaztJqA3XbmJPO4AfNUyInA/e0dV9O8W4JWGh0hWT:nvr1SJDXbOqip0dV9O8W4w
Malware Config
Extracted
xworm
7.tcp.eu.ngrok.io:14058
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Nursultan.exe
Files
-
Nursultan.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ