General
-
Target
Read this Important.pdf.exe
-
Size
151KB
-
MD5
784c00f4c4d67b7c0d0c29670fc3b246
-
SHA1
60cf9fc0b08d3cc8c724a39883d6f6c2964698f1
-
SHA256
a1caabf3afad51e8113e7cc42cd88c135bca6fd20a10d94df584638612465e99
-
SHA512
eb61fe860e8095dbd2bfa6ed355a1236db91fd701ff88c4281e5b6a6dee1fb698da318781c06a356c342e33640c50c26afab3e6fd13236dd296c9d8ea2711963
-
SSDEEP
3072:9NRZtUr0kbW6/mOLCmhM+lmsolAIrRuw+mqv9j1MWLQI:9NRsrnbTra+lDAA
Malware Config
Extracted
xworm
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/H3wFXmEi
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Read this Important.pdf.exe
Files
-
Read this Important.pdf.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ