Behavioral task
behavioral1
Sample
op.exe
Resource
win7-20231129-en
General
-
Target
op.exe
-
Size
68KB
-
MD5
d4c021f050296c309b84059bafa41332
-
SHA1
f0df37f5f880969fcbba1f4f7d9ab7cdb3e596c5
-
SHA256
a615aece52e909040876d9f88984d4a60499f2604dc181acc69aa241dd1e1ed2
-
SHA512
27be42f79cbbf0c8a81c5a2decd0a393e27b0459bff9ed7b5f9b926e93da5f096efbfa6f473525db1d3269795c174506f544866a82774a4d5948bd644bb3aea7
-
SSDEEP
1536:LObri+HdUrMuOGw+btMvnz7W7jqwaeAdKO2mIJ/1h1:LOnxdPuTw+bavfw6QO2mIJf1
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
dllhost.exe
-
telegram
https://api.telegram.org/bot6840593734:AAGeMJswJHfSYYy4WpS8cypmpzA8wfWUYMg/sendMessage?chat_id=1330099235
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource op.exe
Files
-
op.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ