Behavioral task
behavioral1
Sample
d6b7131722978f82195a6657bcadbb97c390966b76850a1bc9d22bdd39cd15da.exe
Resource
win7-20240221-en
General
-
Target
d6b7131722978f82195a6657bcadbb97c390966b76850a1bc9d22bdd39cd15da
-
Size
64KB
-
MD5
467de65b409662f8d65c7211ee45b010
-
SHA1
2c7f3ba6c6417c54b43f3c377a52b6aaec5c56a4
-
SHA256
d6b7131722978f82195a6657bcadbb97c390966b76850a1bc9d22bdd39cd15da
-
SHA512
05904b03b80badc3f251db83386fdaa3d7cee74b09c2a36720fe3f28e8423a54b2932c095169d56eb14583e33b8ef05d64d3a4cd3c62db672ecb86fe6053171a
-
SSDEEP
1536:WguGII9iRUDh9rSST3xLmHF7skbLMEYfgHt9kbMpNZ/OPmFRAjqBi/:vuSNqlskbL/ZN9+8Z/OPmFRksi
Malware Config
Extracted
xworm
51.161.107.65:8080
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6b7131722978f82195a6657bcadbb97c390966b76850a1bc9d22bdd39cd15da
Files
-
d6b7131722978f82195a6657bcadbb97c390966b76850a1bc9d22bdd39cd15da.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ