General
-
Target
executor bootstraper.exe
-
Size
169KB
-
MD5
3e550ed6663b18e851184d31ffc88407
-
SHA1
cfab4776011f2210c975a416a6843785a7702575
-
SHA256
66ab382814c75caa59e396bdef9654a3cf46a26d85114ae2db02a539439c0b66
-
SHA512
8e0427f48fe03819f5435f227fd8262c04de783bccaa72d607cc17dab466fdd5ef90d1e2e82e390eb6ac7f5d877b81b54635f53549dc6e8b03a3853ed1321c00
-
SSDEEP
3072:8xPQt3Hcb0b9xq5OhOpnBz65/M6If+3Js+3JFkKeTnzBeZ:S2Mby9xqJnxBt25
Malware Config
Extracted
xworm
camera-nest.gl.at.ply.gg:50159
147.185.221.22:50159
-
Install_directory
%AppData%
-
install_file
winodws defender.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource executor bootstraper.exe
Files
-
executor bootstraper.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ