Behavioral task
behavioral1
Sample
d3xik-fanowskagra.exe
Resource
win10v2004-20240802-en
General
-
Target
d3xik-fanowskagra.exe
-
Size
34KB
-
MD5
f8d9a0a0a841deef3e48185fad1e0648
-
SHA1
1d2c4eeca78bca6a58815c54ef42ae2e9ede74f6
-
SHA256
1503cba5a67742303e45c266c9585e110429ff25a5c25486cabb82504e51a916
-
SHA512
16d1512724d1ff4cddb4c87cde832601a67a834c29c2b9c08a6159db46c2b481c25e465cab5eb3fea1042e95399a5e962809259a1a0f89565e0ed041448b8596
-
SSDEEP
384:aVxu9qBOae6oK/I7Z9plUzO7LMeyZ9CZpbW3tXe3qXR8pkFXBLTIZwYGzcvw9Ikb:GxuaUJRnpyZ96pbWx9FV9jjTOjhy/4e
Malware Config
Extracted
xworm
5.0
lefferek-42016.portmap.host:61672
budget-compiled.gl.at.ply.gg:61672
G4XVm9sNwISp9OCk
-
Install_directory
%AppData%
-
install_file
DiscordClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3xik-fanowskagra.exe
Files
-
d3xik-fanowskagra.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ