Behavioral task
behavioral1
Sample
3ecc77c478b8ccb8aded6691c6ccb640N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ecc77c478b8ccb8aded6691c6ccb640N.exe
Resource
win10v2004-20240704-en
General
-
Target
3ecc77c478b8ccb8aded6691c6ccb640N.exe
-
Size
275KB
-
MD5
3ecc77c478b8ccb8aded6691c6ccb640
-
SHA1
1562075e36174cf336c635f9e59bb909dff9be31
-
SHA256
65f4ec15c5ae72a0fb0a81a0402fa37a25e5819091d6720a411565085f189b49
-
SHA512
20188c54f8490384fe12e45981de494a4392bf389ed9a03c80274e7ae36bfe67dd9cf1f00f63aa0031911a90326247350d2cc339c8971e84a9ff0410c61f25e7
-
SSDEEP
3072:knuWVzJyeiTAbszqXO8n+Gl+Bv9UdrgD/WHWQHSisKrj/rhIXgPsn9S/1bk6Pj5Q:ku8yeiEbR+NrOQKrj/VgRn9s1vB0d
Malware Config
Extracted
xworm
127.0.0.1:25167
21.ip.gl.ply.gg:25167
-
Install_directory
%AppData%
-
install_file
hh.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ecc77c478b8ccb8aded6691c6ccb640N.exe
Files
-
3ecc77c478b8ccb8aded6691c6ccb640N.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 215KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ