Behavioral task
behavioral1
Sample
jez3kcheaty.exe
Resource
win11-20240802-en
General
-
Target
jez3kcheaty.exe
-
Size
34KB
-
MD5
9136bd273d1775f91fdb7d74bdced16f
-
SHA1
87887fb55990987d4306bf3f5fd1dc15126f4d39
-
SHA256
379a3e62f67815cdb832dafeeb44f15f5cb10f3358db10f2e324379a28cbcf6d
-
SHA512
9fb535eae987a66357e542033bcf1dff607b6b12ed6aadcdfe20bef089262be62557b3b81ae7748057ed041ef06de517bb08fcce3fa0f18c7ecb0a11e7600e63
-
SSDEEP
384:5SyXlquOae6oKoBmoDnnGvBLmlkCwvHixdTD2VR8pkFTBLTIZwYGDcvw9IkuisXu:8yXiBDAtYkC4CaV9FZ9jaG0Ojh8/4b
Malware Config
Extracted
xworm
5.0
lefferek-42016.portmap.host:61672
budget-compiled.gl.at.ply.gg:61672
05Sqy1TNi42fBtLd
-
Install_directory
%AppData%
-
install_file
DiscordClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource jez3kcheaty.exe
Files
-
jez3kcheaty.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ