Behavioral task
behavioral1
Sample
136.exe
Resource
win10v2004-20240508-en
General
-
Target
136.exe
-
Size
69KB
-
MD5
06bffe42daa5d4119aa358248a63fb4e
-
SHA1
15e5b424562516e63ffbafb33399684bcdaa0a51
-
SHA256
ba29b5d5d329a9a2bfbe04973162feb083aa855e98bda3ce21590428e6c21bed
-
SHA512
6271997cd817418be330d5c1addd2dbed24cdd669717557b67a43f0ba86a4c6501d42a0944320f75ed5b6e51f13991e9a5d70d0f26f8d7df95276e1e1638868c
-
SSDEEP
1536:pFtNNT6yOqE7/gZ368+dudbfevU9hDMNKz+61UWfOfaAz+q:LH7uVibfCs6kU4OfaA6q
Malware Config
Extracted
xworm
hit-dubai.gl.at.ply.gg:54434:2137
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 136.exe
Files
-
136.exe.exe windows:4 windows x86 arch:x86
Password: 123456789
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ