Behavioral task
behavioral1
Sample
Account Unbanner.exe
Resource
win10v2004-20240226-en
General
-
Target
Account Unbanner.exe
-
Size
83KB
-
MD5
00af82f670cd8cca69dd7c512f922cd8
-
SHA1
cb1efa881c12ba8a51e37fb3a9ef3ffb85eda2f1
-
SHA256
7ce2cb8dd44fc76937baba9d0169d4d9942d0a0095d052b350abff87a43774f3
-
SHA512
6106def87a147a7e5f85ccb3c2274311d1b5a178e471e62e9d8d29f512a4139bb6a3eae79c3b7aa928432cb489ee61ec617616eaf7ab2bafa9c0e4e30e2df0b6
-
SSDEEP
1536:elTXxzy7eclFEx4UNOYPHMCbSmEsb1kVyjD5PTvgu7/pAOQXO+QaukdRKu:elTKHDGDM8Nbb1kAZTnyOIO+QarKu
Malware Config
Extracted
xworm
throughout-taxation.gl.at.ply.gg:48020
-
Install_directory
%AppData%
-
install_file
xworm connected?.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Account Unbanner.exe
Files
-
Account Unbanner.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ