Behavioral task
behavioral1
Sample
401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad.exe
Resource
win10v2004-20240508-en
General
-
Target
401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad
-
Size
79KB
-
MD5
f1e41321cd4394089842e5121d5cb649
-
SHA1
96e3aff8a0eecda81e8d0b10323a1680b1136387
-
SHA256
401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad
-
SHA512
243adaeca82d89fa982c839c0b730b26e32a228d8e493edb04508f416b262334263c435fead1bffa3ad54a2b574e99cae2fa82d13d2d0c3dbca28c5184f4c9e3
-
SSDEEP
1536:IU8SlJ3N8bspa09DfVtHbRZuBDXcCK68u2yOeYdXGnE1B:cSlJrDHbRZMDXUmO9Wn6B
Malware Config
Extracted
xworm
listing-trackbacks.gl.at.ply.gg:8848
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad
Files
-
401c04370ccefbc9fc186f227d7dcb029c2dfa23c8a77011abe51305471247ad.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ