Behavioral task
behavioral1
Sample
ded5515158d7b1ed9520713645bc63d7bb872f0a212c77ebb1afce0d16fad0ce.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ded5515158d7b1ed9520713645bc63d7bb872f0a212c77ebb1afce0d16fad0ce.exe
Resource
win10v2004-20240508-en
General
-
Target
ded5515158d7b1ed9520713645bc63d7bb872f0a212c77ebb1afce0d16fad0ce.exe
-
Size
251KB
-
MD5
1fee5ce12cd61659dd46575a2e378361
-
SHA1
91722b8dcf5318c379e5ae96692928b22b055969
-
SHA256
ded5515158d7b1ed9520713645bc63d7bb872f0a212c77ebb1afce0d16fad0ce
-
SHA512
9e46fe97922c9c24c9ceb31201bb703ba47b73248c413633c097ec8b44ee026fb4ce2569a3f7578f753b3d8cd7f6ed5aa425bb308b49b7e0062a685468d38638
-
SSDEEP
3072:vfWp/2bS2/YnEtOryoW8SKfbzxcwg7es6/Vsb8VKTu549oJMfF/H9N3Ky9NzLnK:dbn/YnWUhcX7elbKTua9bfF/H9d9n
Malware Config
Extracted
xworm
156.225.129.202:7005
-
Install_directory
%AppData%
-
install_file
crss.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ded5515158d7b1ed9520713645bc63d7bb872f0a212c77ebb1afce0d16fad0ce.exe
Files
-
ded5515158d7b1ed9520713645bc63d7bb872f0a212c77ebb1afce0d16fad0ce.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ