Behavioral task
behavioral1
Sample
326f2caac45fb3fd8aeb65f3c70105bce862022c2e30de367ebf9fbb77d1abce.exe
Resource
win7-20240221-en
General
-
Target
61c7dc2acfea864ad45b2a4fa8b1bb5c.bin
-
Size
16KB
-
MD5
d20d2d8dcc002ee48a12231da49d9d67
-
SHA1
e50bfbbd1c655f870e4ba784f17aa2a236f9f297
-
SHA256
f7a3c14a228e14911462c2917fe5e130ec6ca5a63478b33669af040198780d1e
-
SHA512
4f0f2a89b932b4b1792a1fabd12e2d7fc8d28bef3692dcae7d4204aae78ae644b498ba26e76473e56c84f1a38476692739659ffcdc8457a823003eba0b0dec6c
-
SSDEEP
384:ZfNAP5Aa61soLNqPt5r+3aVL5rMoNuBNKc9eGAbvl2s6:FA5A11VNqOq9FMcuBAcgGcvl2d
Malware Config
Extracted
xworm
5.0
wormplace.duckdns.org:7771
42ZSJUh5fcssCBli
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule static1/unpack001/326f2caac45fb3fd8aeb65f3c70105bce862022c2e30de367ebf9fbb77d1abce.exe family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/326f2caac45fb3fd8aeb65f3c70105bce862022c2e30de367ebf9fbb77d1abce.exe
Files
-
61c7dc2acfea864ad45b2a4fa8b1bb5c.bin.zip
Password: infected
-
326f2caac45fb3fd8aeb65f3c70105bce862022c2e30de367ebf9fbb77d1abce.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ