Behavioral task
behavioral1
Sample
Roblox.soft.exe
Resource
win10-20240404-en
General
-
Target
Roblox.soft.exe
-
Size
208KB
-
MD5
8836cfa5b42391f7f726111f95eb1286
-
SHA1
6ae38fefc80d36d314edc4f21a04659c3d0416f9
-
SHA256
9c71d9c7194e47cba06aa8e3fd6d8fc10cf4199bf5a93967ddf7d1cac345d9b0
-
SHA512
4e8570e0b2cb363f1fa820b66c7da38b9361770d447dbef88018cb1666cdd768c92d838149d0c829e1becec4a2d2d1ccd93e813c88aeb56c513982df59b28854
-
SSDEEP
3072:HsBmjoFb9LmOuq8SKfbzxcwg7es6/Vsb8VKTup49oJMfF/H9N3Ky9NzLnJ:HYb9BUhcX7elbKTuq9bfF/H9d9n
Malware Config
Extracted
xworm
5.0
127.0.0.1:3782
21.ip.gl.ply.gg:3782
ZeU3qSaRXnLlIWu0
-
Install_directory
%Userprofile%
-
install_file
system.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Roblox.soft.exe
Files
-
Roblox.soft.exe.exe windows:4 windows x86 arch:x86
Password: DarkHost2
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ