Behavioral task
behavioral1
Sample
javaw.exe Java(TM) Platform SE binary.exe
Resource
win7-20240215-en
General
-
Target
javaw.exe Java(TM) Platform SE binary.exe
-
Size
66KB
-
MD5
52409e4dbf9ed75c7fd6fbb4e7b1593c
-
SHA1
b2124798396292059c64fcb5e3d40a742ea66f0b
-
SHA256
8c63a9bbb49745a61fbf450e78485966222810403844af067f43046092b02112
-
SHA512
b72e769ced2813f5c93731e9c96bdafeb7359c9aa2b23fe9cb8bea675e1c2fcb2a7208b21bf0fc73d8255ee73bb732aea58ff7ff3a14c7727425947fa3f5c1a7
-
SSDEEP
1536:n61arE0YH/pS9OqgM6J0yJbjwe0qsYJcp66/O8J5:8iETfI9OA6J/bML9O8D
Malware Config
Extracted
xworm
lesbian-organ.gl.at.ply.gg:38343
-
Install_directory
%LocalAppData%
-
install_file
javaw.exe Java(TM) Platform SE binary.exe
-
telegram
https://api.telegram.org/bot7026469441:AAEt3_GfOceSfMaQnCWR3hwEjHcRpqL852Q/sendMessage?chat_id=1434801883
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource javaw.exe Java(TM) Platform SE binary.exe
Files
-
javaw.exe Java(TM) Platform SE binary.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ