Behavioral task
behavioral1
Sample
8c638422d668f0b55ab3f644948440745ae847eb7bc3d516d7bc0953a96dcede.exe
Resource
win7-20240319-en
General
-
Target
868d1dc8e8f5bd6a78f0eabc2b59aff0.bin
-
Size
44KB
-
MD5
92e80b35e64eacdf45a438791070cd0f
-
SHA1
223eed14356c50d13370c118b773ab452d89b9dd
-
SHA256
c27e0cd9fba38da586146d39078f35000db14584882fd0edb2d7273b5ba8d003
-
SHA512
fa9c677be5368dfcf0ab927e70a21972608240e65472313de3cf845bca70ab412f5dc8c170e8b520ac03993a1640763d10dcc49c3c5586eb8b0259a8bc3527d4
-
SSDEEP
768:REIWzDz9BeTbAA0TM4ZiTWQXIzWf3QjOTazCKvUJ7ROHMaNkX76sl:RCzDenATZCWQGqVT968tOHvkXGsl
Malware Config
Extracted
xworm
146.190.57.132:7000
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6491699241:AAEzWMqxLHLa_DADVhFrtpk__NqYBpyS7tI/sendMessage?chat_id=6432387334
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule static1/unpack001/8c638422d668f0b55ab3f644948440745ae847eb7bc3d516d7bc0953a96dcede.exe family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/8c638422d668f0b55ab3f644948440745ae847eb7bc3d516d7bc0953a96dcede.exe
Files
-
868d1dc8e8f5bd6a78f0eabc2b59aff0.bin.zip
Password: infected
-
8c638422d668f0b55ab3f644948440745ae847eb7bc3d516d7bc0953a96dcede.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ