Behavioral task
behavioral1
Sample
6ce1628469599a4b2975096bcd6a1218857041241f223703c49b5a355d3aef3aN.exe
Resource
win7-20240903-en
General
-
Target
6ce1628469599a4b2975096bcd6a1218857041241f223703c49b5a355d3aef3aN
-
Size
41KB
-
MD5
675a1883118b0c605d24feb35b3744a0
-
SHA1
d8ab573eed0befb3c1d357d30b475a3d6a5ebff2
-
SHA256
6ce1628469599a4b2975096bcd6a1218857041241f223703c49b5a355d3aef3a
-
SHA512
208c7415af6f9d7d53484a3002a5b2d4bf71375179f4c3799f5b74d13e25ab11f2dcaafa9269ec222542eeed9e92a048c6a29f55b5c32aac0e156d96f0d3d4c7
-
SSDEEP
768:RmrJDweBDuOkScrbsN/x6WECAr43MxfJF5Pa9p+z6iOwhD3/ibv:R0DwewicrbsN/YDRrNRF49Iz6iOw1ab
Malware Config
Extracted
xworm
5.0
prices-saddam.gl.at.ply.gg:64107
MQ5RONoNfhXmQPAq
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ce1628469599a4b2975096bcd6a1218857041241f223703c49b5a355d3aef3aN
Files
-
6ce1628469599a4b2975096bcd6a1218857041241f223703c49b5a355d3aef3aN.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ