Behavioral task
behavioral1
Sample
Empyrean Removal Tool.exe
Resource
win11-20240508-en
General
-
Target
Empyrean Removal Tool.exe
-
Size
44KB
-
MD5
72dc44b2e7ef74718c563d397b1b1fbf
-
SHA1
6874f37359d554346dc024cffc4a3a68334494b2
-
SHA256
fd8fb92324e4f5bb8665514b0c19f8bd4354ef091d8f2d088b528f1d21405066
-
SHA512
a5a84f6ea2cdbec151de9d49b67aa07cfd2d23e9035b2863fadc59c58012f6fb9c1d69106e981bde9d49f9d28b4946c3ada80a3fcd03a7a6e353b90105c9304e
-
SSDEEP
768:sMDF7zLXoeUHyLpeuddqLi9Fk9wO0/O/hY/22gds4S1EAd8IIf:HF73XoeUS9Hd9Fk9wv/O/+u2gdS1EAdo
Malware Config
Extracted
xworm
5.0
75.24.104.157:4782
LalTxzCzI20sKikz
-
Install_directory
%Public%
-
install_file
$77-Update.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Empyrean Removal Tool.exe
Files
-
Empyrean Removal Tool.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ