Behavioral task
behavioral1
Sample
newloader.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
newloader.exe
Resource
win10v2004-20240802-en
General
-
Target
newloader.exe
-
Size
66KB
-
MD5
2f7438d134357fd6a5157f6fb9880bc6
-
SHA1
b61b00d0f72e93b59fc70e5ec94dd14aca88cfa3
-
SHA256
84f038612e5a81b61439d228eb846fe466ef16d4a8675face072d42f3ebde4f5
-
SHA512
7f37682a27557794aba4daa8f93735d6b78ee4152cc1b9b5acb1c9926341964cc04c685c20b7610c2280e38155d316a6acc42d2f1b635ea1f500560699c0f891
-
SSDEEP
1536:15AzL7yyBpcZdS70HRvIqxVQb6+uZgkP6wrTXOqgvoudo:SyfdiORvIuyb6+fkBTXOqgJo
Malware Config
Extracted
xworm
t-abc.gl.at.ply.gg:29321
192.168.1.45:29321
-
Install_directory
%AppData%
-
install_file
windowshelp.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource newloader.exe
Files
-
newloader.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ