Behavioral task
behavioral1
Sample
main.py.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
main.py.exe
Resource
win10v2004-20240802-en
General
-
Target
main.py.exe
-
Size
44KB
-
MD5
aacd79d677898cf5c143ee144aeacdba
-
SHA1
1f6bbacd1373226e2ef53cca19754be6b8d73619
-
SHA256
1179583d5b06240bdfbd61745abeb7706e4b75d2d42a561b71f39d8e6edb9e7e
-
SHA512
f3a144841980da5fb5105731033c596d2e96e68a663af4790fa0009b58e479d6dcf4a7f69aff2a4ae56f4e28ee86b00cce3dac24739826ec980ab699a338e46a
-
SSDEEP
768:/0yUbkms0JqxXAsvfgf3okU2jCp/J7X+F+R9pP46vOChQbWL6h:/0/bkt0JqhAmfU5U2jG/FOF09R46vOCK
Malware Config
Extracted
xworm
5.0
coming-park.gl.at.ply.gg:2444
RaGFrRd5XNdQrnY7
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource main.py.exe
Files
-
main.py.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ