Behavioral task
behavioral1
Sample
aaa.vmp.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
aaa.vmp.exe
Resource
win10-20240404-en
General
-
Target
aaa.vmp.exe
-
Size
500KB
-
MD5
9b1bda18212f67772dd91d23b6ac9c45
-
SHA1
7fd62b926ff615f3354f2c0b08c137169ce0a167
-
SHA256
c0426a97e010bc2d2c24e1a33315c8026ce67e671bbdf34ab511f9e2a4d6cf38
-
SHA512
f87f52c4d344e861f399844bf75dbaaf1252313b96fa8a03f2a1ed46a04d12110f47bb3b8bd1a3f5c91e116b91c112828ced260c4bddaff4f29effe1b223ba4e
-
SSDEEP
12288:TbGZ9KgSjICbPwrsTDCiE/gMAKNHsyDj5rVJelmuL/6e:i9HSjjTnnClvrNMsVr
Malware Config
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aaa.vmp.exe
Files
-
aaa.vmp.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Mg> Size: - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.O3 Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
./S; Size: 496KB - Virtual size: 496KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ