Behavioral task
behavioral1
Sample
c2c61c5f82cb2d6c83ab49c6920ea7c6fb234d9b7b7c27371eaf32642bffb998.exe
Resource
win7-20240903-en
General
-
Target
c2c61c5f82cb2d6c83ab49c6920ea7c6fb234d9b7b7c27371eaf32642bffb998.exe
-
Size
32KB
-
MD5
b559dd95e86bca121f61724ecbcb22c2
-
SHA1
b1e421fd05398012b7e50906c829624746c2ef08
-
SHA256
c2c61c5f82cb2d6c83ab49c6920ea7c6fb234d9b7b7c27371eaf32642bffb998
-
SHA512
1cf86ec98a6d4d305e22452b58ffbc7fd5df8b9fd30343820b94c4db4cfb2f6a5a390eda20fef93dd33b221df2d6f8e406ffc78b0ff0156597641a246721f33e
-
SSDEEP
384:QEbmX5Qa+vN1h1+X3v6JFjL+go3Tm2eaFObJdRApkFTBLTsOZwpGd2v99IkuisIx:VVa+vNtg+PBo3Tw4eJdVFE9jMOjhUbs
Malware Config
Extracted
xworm
5.0
45.94.31.88:7000
33xFLWKZRRd5Bs6e
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2c61c5f82cb2d6c83ab49c6920ea7c6fb234d9b7b7c27371eaf32642bffb998.exe
Files
-
c2c61c5f82cb2d6c83ab49c6920ea7c6fb234d9b7b7c27371eaf32642bffb998.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ