Behavioral task
behavioral1
Sample
DDOS MACHINE.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
DDOS MACHINE.exe
Resource
win10v2004-20240802-en
General
-
Target
DDOS MACHINE.exe
-
Size
246KB
-
MD5
3f4ac5ebf07ce3b4fbf7c53a99e9a95a
-
SHA1
3fe8113fa02867e96b671916a1f64afd0652bb3f
-
SHA256
4e2f315aec3cb1e8bc76424378ece6fa983d440b24d28863db91985f1adf4e7f
-
SHA512
c1099c4874e90cc0aa571434b6d8681e08914eb9fc21d6b2ff55aa4a3c459e769dff29a4121f728f047a6b714d9adc7f8c9493aaccfeffe57e11321bb36bc7de
-
SSDEEP
6144:gr9hCkZbhCFr+UhcX7elbKTua9bfF/H9d9n:gr9hCUE+3X3u+
Malware Config
Extracted
xworm
193.161.193.99:1194
-
Install_directory
%ProgramData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7359511930:AAFUm0iYhzGrRDo1gtea6bO9ZS8MYaGi__U/sendMessage?chat_id=6243944849
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource DDOS MACHINE.exe
Files
-
DDOS MACHINE.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ