Behavioral task
behavioral1
Sample
solarka.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
solarka.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
solarka.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
solarka.exe
Resource
win11-20240802-en
General
-
Target
solarka.exe
-
Size
65KB
-
MD5
b0c354614759bcb78161a0856fe38b51
-
SHA1
b392f0fdd94b3d29626ee8dccdfc044e711b2fda
-
SHA256
ac7763d07b0cffa2c4c93ad9bf575431d13dee0cde6b92e8b60cf27743ac689d
-
SHA512
ab051bc4a82500203f625f89a7ec952984e26bb344a6c81d0a58acd793c9ce1aae7475f18cc005e0ac9f16b0f3b7ecd8a9b0ace4718e679806073d82194e06ef
-
SSDEEP
1536:wZD0L4xdm0olrYyufb+ZeaJqy+GCuwwOYwqZyVLB:CFxU0o5YyufbkeXG7wwOYpZydB
Malware Config
Extracted
xworm
third-reminder.gl.at.ply.gg:55573
-
Install_directory
%AppData%
-
install_file
hentai.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource solarka.exe
Files
-
solarka.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ