Behavioral task
behavioral1
Sample
VanityChecker2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
VanityChecker2.exe
Resource
win10v2004-20240709-en
General
-
Target
VanityChecker2.exe
-
Size
80KB
-
MD5
5f5417daa231b309e3e0c475da2aec8b
-
SHA1
82ab614a5972fe02eab207f616c65d60b00569f7
-
SHA256
6e02ebb2a5f640aaf23937320b7aa937d346f0ede4564290b4823e0267b3ac56
-
SHA512
9b07a14d48cd8a44d0b441a02a2da01f1fde1feb4c7368175819c37fab33fc57c93aea675329d688519dea8df1fad6a87dba5de718c188a62a950bc43f09948d
-
SSDEEP
1536:kSGqmP89DMd5+d7Q+SHbrdV/p9626/0cF/OufurbB6PRFDU:kvHdwd7Q+Qbr76p/0cF/OufuXqFDU
Malware Config
Extracted
xworm
localhost:8848
127.0.0.1:8848
user-centre.gl.at.ply.gg:8848
-
Install_directory
%AppData%
-
install_file
xdwdNotepad++.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VanityChecker2.exe
Files
-
VanityChecker2.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ