Behavioral task
behavioral1
Sample
2832-23-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2832-23-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
2832-23-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
7392f79f184d419165b09dfee90ee581
-
SHA1
7367650919732e252d105b22bcfdec0ea6611bf2
-
SHA256
138f245d10982872eada925b7f35fef6172b425139e3b147af013a2b4ae4c13e
-
SHA512
2e53b414a99eb50540bc4b50a8fd455b7983ab657590370ecab82b3981e0ddca6bf1552a1f8c5057ebc2967db894e1bdd32a5b92f377af486ec2f1fb7b6f1056
-
SSDEEP
768:kPSPVmqBV0bdIPFOkFWb9KX3XOohw0aiMU:2C0bdIFy9KX3XOo2RU
Malware Config
Extracted
xworm
5.0
as525795.duckdns.org:6980
194.37.97.150:6980
wtYmVE2WY2XGhWlO
-
install_file
adobe.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2832-23-0x0000000000400000-0x0000000000412000-memory.dmp
Files
-
2832-23-0x0000000000400000-0x0000000000412000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ