Behavioral task
behavioral1
Sample
a9b00ac5f9c02e540c61381a5fae62c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9b00ac5f9c02e540c61381a5fae62c3.exe
Resource
win10v2004-20240508-en
General
-
Target
a9b00ac5f9c02e540c61381a5fae62c3.bin
-
Size
99KB
-
MD5
a9b00ac5f9c02e540c61381a5fae62c3
-
SHA1
273e272cc73d519c5cba2839de4e6043fd8977b0
-
SHA256
3ad4aa1921b844c635bbeef2a492a3d1ff134af6a38a1c31d7d264da3e192a38
-
SHA512
924316a6cd0b91617d23010cc031ccbc1a99c4d72f9199fb3215d68ae6ea6cc9c3a4888777bf4c72d920d940e68b828a4ede75c299a5f7b7f804250cea4ae570
-
SSDEEP
1536:n1vP5KmktoR0wQNB+QC+ZMh/uFPah6x2C4bFwOL/n6106/Y7FwoOLTrXatVSFayK:VxLCLN06PahfLbFZL/6PWZOL6GPPy
Malware Config
Extracted
xworm
auto-london.gl.at.ply.gg:51655
-
Install_directory
%LocalAppData%
-
install_file
NigNigRat.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9b00ac5f9c02e540c61381a5fae62c3.bin
Files
-
a9b00ac5f9c02e540c61381a5fae62c3.bin.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ