Behavioral task
behavioral1
Sample
ed54900c3d48f377ada002cfff6e633a5041205c4bbc41c815921bcc6569a322.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ed54900c3d48f377ada002cfff6e633a5041205c4bbc41c815921bcc6569a322.exe
Resource
win10v2004-20240226-en
General
-
Target
ed54900c3d48f377ada002cfff6e633a5041205c4bbc41c815921bcc6569a322
-
Size
69KB
-
MD5
413c101b7b8aee26309cd99b2ff53000
-
SHA1
fa693b2dc2b562cc8e9752cf4201f93aaeb450bf
-
SHA256
ed54900c3d48f377ada002cfff6e633a5041205c4bbc41c815921bcc6569a322
-
SHA512
9c1f17d4804afd60b00381b14e76b8dbdd562b5b7cd9ef3093ec8565982fda23dfc615d032b4592dcb8632bb946e26c6e0a8cec111b6ab51faa461ab60cfa5f4
-
SSDEEP
1536:A/XVGp9iQL+9LPFhm+bIz1ZbhBUMbe/kkAuOX0MGzpF:+XVGWQL+pP9+ZbnUL/OuOEMGz3
Malware Config
Extracted
xworm
3.0
canyouseeme22.ddns.net:6065
-
Install_directory
%AppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6660763124:AAFE8PXu74Jm6rucbd_6w86T8pGiY0tWsvk/sendMessage?chat_id=6273743275
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ed54900c3d48f377ada002cfff6e633a5041205c4bbc41c815921bcc6569a322
Files
-
ed54900c3d48f377ada002cfff6e633a5041205c4bbc41c815921bcc6569a322.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ