Behavioral task
behavioral1
Sample
NNCracker.exe
Resource
win10v2004-20240508-en
General
-
Target
NNCracker.exe
-
Size
352KB
-
MD5
8d1220eb9c315ba42c84067aff8c55e2
-
SHA1
e5a143f34840ef2f2b8fd9955e7e90ab0e0486e2
-
SHA256
87f4168f6e4a1698685eec9fffe256d8dac7398b214f6b5ca6188ab17fafbdd2
-
SHA512
9ff73f60af6c8253d8378a108fe2581dac7a400dc7f7a0e69503d85f430797320a067464a473462138e312323294c957bcbad1fe069b6b3250193b7ad81138ce
-
SSDEEP
3072:H9hCibrK52spPjbtbyhSO6Kz4nDfoiyz98HzX5:H9hC1pPHtb4zUDQBh4
Malware Config
Extracted
xworm
127.0.0.1:1337
104.28.229.13:1337
192.168.2.133:1337
104.28.197.13:1337
-
Install_directory
%ProgramData%
-
telegram
https://api.telegram.org/bot6911706583:AAGIck5-GICDZLswgqJrJgL5L_TBxq7tj7Y/sendMessage?chat_id=6727135086
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NNCracker.exe
Files
-
NNCracker.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ