General
-
Target
a.exe
-
Size
85KB
-
MD5
417a969f9dc63104439b682293408bf9
-
SHA1
688e3dc0969ee91f733bf3535c23dd818d3d57dc
-
SHA256
7fd6c49581ca8eeada8ed8914c01c2216c79c43ec9ac8955d68a9e8f493aba0c
-
SHA512
96131dbc21d013e330eecc0ecd3fafc2918280c3b167a1227469579f03763a8b258de881bf8f55ee84bc4d450b9566d990d2002897270bd303c37bd59e27276c
-
SSDEEP
1536:RCTZhI58OPqP8UummNsBenUbDypu37HVhba/GJdiKZLx2vBfKC3hG4S7OYQJLrfr:R6ZWYP8XmnQUbiu371hba/EI+x2JiwwW
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
sockhost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a.exe
Files
-
a.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ