Behavioral task
behavioral1
Sample
barbaris.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
barbaris.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
barbaris.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
barbaris.exe
Resource
win11-20240709-en
General
-
Target
barbaris.exe
-
Size
35KB
-
MD5
8a95f3a8f9e8e5054b9ac77bfb4107da
-
SHA1
04112552c2b8b3477c600b137b795105baabfd49
-
SHA256
1e6e1b583d32a324eca2a7e0e6d2de1eea1566c8b3c411a472fb14274e0baa9c
-
SHA512
dafbea532a8cd3148d78dd6cb994d0577a56b0ed9157514c230aa4569a2ad31e737bd0cf53a919b2267e62e4b0e5874e24d6bc0b29389ee1ea0b1761101c8161
-
SSDEEP
768:kMnF7zPeWoH3O0dKuddqLi9Fk9wBu7fBO/h2/22N:DF7zeWoH+Wzd9Fk9wBu7pO/Yu2N
Malware Config
Extracted
xworm
5.0
127.0.0.1:17285
politics-challenging.gl.at.ply.gg:17285
mQukoA4WoglTbfMh
-
Install_directory
%AppData%
-
install_file
steam.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource barbaris.exe
Files
-
barbaris.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ