Behavioral task
behavioral1
Sample
19b612d8258a3c6300227a5270bf0e0d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
19b612d8258a3c6300227a5270bf0e0d.exe
Resource
win10v2004-20240226-en
General
-
Target
19b612d8258a3c6300227a5270bf0e0d.bin
-
Size
189KB
-
MD5
19b612d8258a3c6300227a5270bf0e0d
-
SHA1
9ddafe3f33ea0cba2d7a75c1ca67d25d11227916
-
SHA256
5470e1b97815a9c5454e037439cae4c6f4966d22aacdb90c6714cbde4616fcf0
-
SHA512
c6e675aa27bcbe0e395cf54bf871fb32a1af28f3fb7ff56cd6818fe912918a565c9cce2935c42495ede3fd0ff12935723ed2f1ead372d9bbbc68d0b468891005
-
SSDEEP
3072:qb5EbX3RagibJ9o/VW43OkyiC2Bz65/M6If+3Js+3JFkKeTnY:aUHAgibI/Q4DC2xBt25
Malware Config
Extracted
xworm
140.238.91.110:33439
uk2.localto.net:38769:33439
-
Install_directory
%ProgramData%
-
install_file
WS64XENDISA.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19b612d8258a3c6300227a5270bf0e0d.bin
Files
-
19b612d8258a3c6300227a5270bf0e0d.bin.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ