Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win10v2004-20240426-en
General
-
Target
test.exe
-
Size
73KB
-
MD5
c3f275b5066a070e51a88875f255c5ec
-
SHA1
9c5be1eee9ee144c27b09b6cea421da61e21270c
-
SHA256
fd7e3f3f57dacf4104586735c04a83749bd402ed2dcb1e8d2b32ff7c6cb616b4
-
SHA512
69dd3cc0a9d5d4de337f2bdd51c3cc7f6841ff6aaa535414b0a1ddfff8ea718dc4184c43b19fc39bb9f7cf92a758a8ac782c10763606abb515327ad348fbe014
-
SSDEEP
1536:JlrZaPVoBuRxa0bbPQr2BTC+bCtFUXKqypOiG6UQ1l7OxU31KGo/:UPPkgm+bGFZoQ1l7OM1K/
Malware Config
Extracted
xworm
https://pastebin.com/raw/iHh0cxRD:123456789
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
pastebin_url
https://pastebin.com/raw/iHh0cxRD
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource test.exe
Files
-
test.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ