Behavioral task
behavioral1
Sample
9b784a455868d9670106d82c504421506b94c040f1aa8d3bf129d6306b4db287N.exe
Resource
win7-20240903-en
General
-
Target
9b784a455868d9670106d82c504421506b94c040f1aa8d3bf129d6306b4db287N.exe
-
Size
76KB
-
MD5
51b18ca06caef067d41e3f55234ce9d0
-
SHA1
5346383ed9415a479c9dad0dbb7eb6ae6a5545cb
-
SHA256
9b784a455868d9670106d82c504421506b94c040f1aa8d3bf129d6306b4db287
-
SHA512
48ec46d289f9075bd89682a070a79bc5ed832fe1fb6b7c31e2a4331550bddc2013892784e0fc9433035800b188e9a683fc1bfecfd1f75678db18be87c16b6cbb
-
SSDEEP
1536:uAyhYQDNkoAVOV066wJZzZ+bDyNiQw4gH6DD6O1+WPeURcb:KiEmoAwxzZ+bDys7OsWS
Malware Config
Extracted
xworm
week-measures.gl.at.ply.gg:52951
-
Install_directory
%AppData%
-
install_file
BrowserUpdate.exe
-
telegram
https://api.telegram.org/bot7409084272:AAGfvawizs5psSM16en9CLFzI0ZQnCNB3SA
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9b784a455868d9670106d82c504421506b94c040f1aa8d3bf129d6306b4db287N.exe
Files
-
9b784a455868d9670106d82c504421506b94c040f1aa8d3bf129d6306b4db287N.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ