Behavioral task
behavioral1
Sample
z84jxn2.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
z84jxn2.rar
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
z842jxn2/z872jxn2.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
z842jxn2/z872jxn2.exe
Resource
win10v2004-20240412-en
General
-
Target
z84jxn2.rar
-
Size
39KB
-
MD5
9ca6caaa1fcda89d59529f1e09dc3b4c
-
SHA1
1106f781d017d1b6c1369c600f2a8aba1239fac4
-
SHA256
b01bb940254688c9ff0f2f7e0acc73ac7aa6c0e01c80f9417524cf7150edadfa
-
SHA512
d58b1444253c1cde779e2a5dad7f33d19a940560f1a1935eebd8c85797126d55022cccf141ac75c3b286b194017261a308309693ccaf31efb4a39f2e7d7520e0
-
SSDEEP
768:CtyYxjiWinegBxVUo0OXUoSy8UzNvsOajJT0VCmZ1jn5i4nWBIRxQ/:CtyyjfiN5Uo0ATSyzRsO8WVH1wIO/
Malware Config
Extracted
xworm
195.35.2.168:7000
86.29.59.189:7000
72.59.79.119:7000
52.12.52.167:7000
16.39.62.122:7000
-
Install_directory
%Public%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7082635030:AAGxz6qjNlJ3WqLSL0ZicFOCA9YHE32yRzQ/sendMessage?chat_id=6484754327
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule static1/unpack001/z842jxn2/z872jxn2.exe family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/z842jxn2/z872jxn2.exe
Files
-
z84jxn2.rar.rar
-
z842jxn2/z872jxn2.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ