Behavioral task
behavioral1
Sample
exerat.exe
Resource
win10v2004-20240802-en
General
-
Target
exerat.exe
-
Size
144KB
-
MD5
2e8e927794b0c56324233077c43e3167
-
SHA1
0cb2f30a977e83c3ce6275673c718ae20ec32337
-
SHA256
b52c318fa8920d155d54fe5c691a4439a65a017dc66debf5439ca8ff8bcd9b79
-
SHA512
a4df86e1f16bb5f94f850e14be647ba5119170ac36e616a20bceab6d230d6f6de6049fabaa416434611542b466306203a71ec36817b66e1af857185a1b5654c2
-
SSDEEP
3072:QYfiiyfb9mNOgQBQFF2RYtMgK+Wl9HhDhIpfeZQKGtoFLjMD:lSbPCjthy9H9h4mZQKen
Malware Config
Extracted
xworm
147.185.221.21:37029
-
Install_directory
%AppData%
-
install_file
Steam Client Service.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource exerat.exe
Files
-
exerat.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ