Behavioral task
behavioral1
Sample
04d2045292af6a1891922538eab357d01ad76de5e0ad22e01842b3588c328b89.exe
Resource
win7-20240220-en
General
-
Target
04d2045292af6a1891922538eab357d01ad76de5e0ad22e01842b3588c328b89.exe
-
Size
38KB
-
MD5
7e30a1a92f86e8e0a25154b1521d0588
-
SHA1
44eb62f211c9d6a60184256080fc7b7cc3dde692
-
SHA256
04d2045292af6a1891922538eab357d01ad76de5e0ad22e01842b3588c328b89
-
SHA512
8fc5e9d163cc09251ae7d3d63532935fb415bb65fa577675a25cc40fdf876aded7adfcbc76a3951ca2d973ac5891477fc0c318ebc2b1d838e0975a1b9b21830d
-
SSDEEP
768:buxxo5SsT2XI7W4AsPKAxkpJFyFWP09x/OMhWif:qjMdT2v4BPK6kpJIFJ9x/OMI+
Malware Config
Extracted
xworm
5.0
45.74.8.236:5355
cEyzqXDyec8SgvAp
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6803832694:AAGUd1u7orDCJRg0J4P9lSZtOSdC_d5u7bE/sendMessage?chat_id=1023602234
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04d2045292af6a1891922538eab357d01ad76de5e0ad22e01842b3588c328b89.exe
Files
-
04d2045292af6a1891922538eab357d01ad76de5e0ad22e01842b3588c328b89.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ