Behavioral task
behavioral1
Sample
xhTOzKi0iBBi.exe
Resource
win7-20231129-en
General
-
Target
xhTOzKi0iBBi.exe
-
Size
70KB
-
MD5
ec705251e4fe1bbe9d290ab47ccb81f6
-
SHA1
6f44897ea0d5262af07060dc62eef2b587824739
-
SHA256
3f6e19f45a68036b285b23d99d2f5e5c36588806443d7f48fd9732805a303735
-
SHA512
aca9167a15ded2963a0042870c3cf0831792c94bcf0d01a1484b59866c060849f2231e525ca2adf0f5f51a663ae21b22f499201da56d82422259c8c0786ea419
-
SSDEEP
1536:69TvMHGXOqGQY6e4HEdg0xq+biomCftg4I+ONsS1QXQiv7:NHcGQY6ezmD+biG+4I+OOS1QXQ0
Malware Config
Extracted
xworm
powerup.dynuddns.net:5656
-
Install_directory
%AppData%
-
install_file
security.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource xhTOzKi0iBBi.exe
Files
-
xhTOzKi0iBBi.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ