Behavioral task
behavioral1
Sample
afbe2e8073c5b33ca208df6236935828f361e07c38c30d7623e2fdbeb364eae0.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
afbe2e8073c5b33ca208df6236935828f361e07c38c30d7623e2fdbeb364eae0.exe
Resource
win10v2004-20240412-en
General
-
Target
afbe2e8073c5b33ca208df6236935828f361e07c38c30d7623e2fdbeb364eae0
-
Size
138KB
-
MD5
6b5e2f36ef97d9df5f3782f830f4862f
-
SHA1
7bc3c5a3dd67ab516136494054f86ff4fd5f76bc
-
SHA256
afbe2e8073c5b33ca208df6236935828f361e07c38c30d7623e2fdbeb364eae0
-
SHA512
b8955b20c6b0d80f4dc98a048614d11c6956c6e5bd9739039e32e2ef9b4be440fe84ff2cacccdc98f2533448214b0fb88dc7921b3c5a47e471ac93c226f0d17f
-
SSDEEP
3072:6bw73rqF49ECOw3Bz65/M6If+3Js+3JFkKeTnv:vE495xBt25
Malware Config
Extracted
xworm
5.0
SjDtBhBaGIZQR4px
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/B35WQJP6
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource afbe2e8073c5b33ca208df6236935828f361e07c38c30d7623e2fdbeb364eae0
Files
-
afbe2e8073c5b33ca208df6236935828f361e07c38c30d7623e2fdbeb364eae0.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ