Behavioral task
behavioral1
Sample
17103387091c3d21384080163acaf4224743a65eb3966fbe37dad6c29e824ce36731d1b209236.exe
Resource
win7-20240220-en
General
-
Target
17103387091c3d21384080163acaf4224743a65eb3966fbe37dad6c29e824ce36731d1b209236.dat-decoded
-
Size
36KB
-
MD5
698b68c9b46313a045256ea622c27ae6
-
SHA1
231e04d63eb89cca4368b30c03efaa44a265f2fb
-
SHA256
6cc5c5302a2072f9821c40c06370e584704f8c073db2ce36e9e6c42afb0b4b28
-
SHA512
6e2908a90f7722862feca0ce4c9aebe0a04a22ba756ecdf783d76c9d60e7d5e5dfaffdeeb0a5ebc01273d7fa004f30151a8ae17d3d6673c745b8be6b48bde3e1
-
SSDEEP
768:2GLtt3QI2/yQJVZFDeo8icH1bxbFb9E7OMhDQXv6:2Ab3QI2/yQBteNicH1bBFb9E7OM566
Malware Config
Extracted
xworm
5.0
paulrdp02.duckdns.org:7000
SLeV9gK9tl4aMP8X
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17103387091c3d21384080163acaf4224743a65eb3966fbe37dad6c29e824ce36731d1b209236.dat-decoded
Files
-
17103387091c3d21384080163acaf4224743a65eb3966fbe37dad6c29e824ce36731d1b209236.dat-decoded.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ