Behavioral task
behavioral1
Sample
5e2c26c0eb5780f72a71e6cc301be33aa77f256bedcc36c09fe1a94631e253c8.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
5e2c26c0eb5780f72a71e6cc301be33aa77f256bedcc36c09fe1a94631e253c8.exe
Resource
win10v2004-20240611-en
General
-
Target
5e2c26c0eb5780f72a71e6cc301be33aa77f256bedcc36c09fe1a94631e253c8
-
Size
46KB
-
MD5
107b88a5482d6b3d2ad1d31925634ebc
-
SHA1
859d504468382d78d37536c55119d7a8b6a4233e
-
SHA256
5e2c26c0eb5780f72a71e6cc301be33aa77f256bedcc36c09fe1a94631e253c8
-
SHA512
86761bcfccae21c57986a57c061f324105cc92e33c1a53cb78f886ae3ff235bf0fc2da117a8e4b7c9d5b14bc3ac49ec09bcb6315db8db5e8420183f692b9375c
-
SSDEEP
768:08i3sGPA22e+OgepWGhDylCBTw8A6Naqww9bWkxtrlVG:0HgOBy7Lw9Ck/jG
Malware Config
Extracted
xworm
RzTN4Iy09ta2cJpv
-
Install_directory
%key%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/KWL0Eq3r
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Detects executables (downlaoders) containing URLs to raw contents of a paste 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_RawPaste_URL -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5e2c26c0eb5780f72a71e6cc301be33aa77f256bedcc36c09fe1a94631e253c8
Files
-
5e2c26c0eb5780f72a71e6cc301be33aa77f256bedcc36c09fe1a94631e253c8.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ