Behavioral task
behavioral1
Sample
c3ea7a64dd0e6d1888a6403e38f300d30c55340e55d9e76741e42fd3ec689213.exe
Resource
win7-20240508-en
General
-
Target
c3ea7a64dd0e6d1888a6403e38f300d30c55340e55d9e76741e42fd3ec689213.exe
-
Size
69KB
-
MD5
81cb3e2ab304c4dde3bfd1c7104736eb
-
SHA1
0d17fe8ac5fdac8838d4bb8eeb234eb9bf96b258
-
SHA256
c3ea7a64dd0e6d1888a6403e38f300d30c55340e55d9e76741e42fd3ec689213
-
SHA512
d8d1cfe363e46bdf5a5dc0aecb5baf5155c663c1aeea165b4b6f54e38e16e1e200f455b25175037989ab592ed730692a3bc3958134bd67688b997e7d9d2c0e44
-
SSDEEP
1536:TqJOKanpCtrpBpGTkLXRLNYY4b2IbPdZ5mY6aeO966xZWPFta:mengrpmkZNYY4b2IrP5YO96CZWPPa
Malware Config
Extracted
xworm
3.1
daddy.linkpc.net:7000
-
Install_directory
%AppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6659084379:AAHwYx_m5LGEEADvQo2F9Q3CbvJIfs0Hh7o/sendMessage?chat_id=5457636267
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects executables using Telegram Chat Bot 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_TelegramChatBot -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3ea7a64dd0e6d1888a6403e38f300d30c55340e55d9e76741e42fd3ec689213.exe
Files
-
c3ea7a64dd0e6d1888a6403e38f300d30c55340e55d9e76741e42fd3ec689213.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ