Behavioral task
behavioral1
Sample
start.exe
Resource
win7-20240419-en
General
-
Target
start.exe
-
Size
38KB
-
MD5
6830fa40c03aa2eaf6eb50a7af9ef922
-
SHA1
356d0017db660e08f14815ace2dbd2cc1250e0d0
-
SHA256
5d27e425e1e3c273d097740439b6283e25d408f9f1ab5d1744554ee5cbf67873
-
SHA512
3da0beaa4c4371d94946ee22b3306234f8611771e8fa1856c6096d4ce7e67952b3b388891d6c0e74b00464a6df62412d44abe2707378dd100b76b2716f51351f
-
SSDEEP
768:byMg0j1p2gKp72zszZ5rsse3XFyG9Oew6dOjh4D0zkq:byMjU7LzZ5rssaFT9Lw6dOjZ
Malware Config
Extracted
xworm
5.0
tool-seven.gl.at.ply.gg:52445
OgInAWRCU5b1qP89
-
Install_directory
%AppData%
-
install_file
Start.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource start.exe
Files
-
start.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ