Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240220-en
General
-
Target
tmp
-
Size
172KB
-
MD5
ee5d33607a56c43f8a9379b0470d65d8
-
SHA1
193fab7a233cc581508eb4306af6f83e9688b7ec
-
SHA256
78348c58f0c2c1d9bfc3d9465aa0cd593057cef6c784a0f5fd3c80320f7a3ba8
-
SHA512
ca468e9c543b5c55babe75094aef103b5139e0a9300791ad76f6f2e39c85e8d1b55d2c9f7e9e394372ec060e92cc1b8c1bcfdb17f3845fbadddaf55cb690b019
-
SSDEEP
3072:rHAIyOb33xiOH6h4NpVq8BxFRzaqF+o2GQJ7/JzqVfGvp:zNyOb6gVqwlL
Malware Config
Extracted
xworm
154.17.167.69:4578
-
Install_directory
%AppData%
-
install_file
ValorantAntihack.exe
-
telegram
https://api.telegram.org/bot6945133496:AAGQ6NjQ8xOEb62NcIypRYZcYBwGtHyIiG8/sendMessage?chat_id=6916846046
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource tmp
Files
-
tmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ