General
-
Target
test.exe
-
Size
36KB
-
MD5
9cffd37fa8bfb817c694b05f11830e5e
-
SHA1
695345b7aee7cd23313bb4e17bf5107d41a1890a
-
SHA256
bb2d2e315277df304252a7abd574c8ecb80b5bb88828dfe2aea3d2c23ad86daf
-
SHA512
20012f341b0085aa1285e65dda729c4f9d6b0f561f38988ce14e5f6a5a86c278c2cc83bea020717ea074abb6d24f86e8289dcb23df5b8a8e2db956732ef0f03f
-
SSDEEP
768:+TAe+S7N5t5NdhgOySeLFy79CYOjh2Py2v4:+gSbddhiFU9CYOjsv4
Malware Config
Extracted
xworm
5.0
mode-clusters.gl.at.ply.gg:36304
a5ja8J7AVLT3U4oI
-
Install_directory
%Userprofile%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource test.exe
Files
-
test.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ