Behavioral task
behavioral1
Sample
uidiscord.exe
Resource
win7-20240903-en
General
-
Target
uidiscord.exe
-
Size
40KB
-
MD5
7aef605f69c095df3fdb7e957f49c240
-
SHA1
ba625175d4dbfd63ed4e26e32da37a23bf34507c
-
SHA256
7ae7526ab8be88b3d5266cd86d23fbab9aec7410d81aac1b9631a29ef44f6dc5
-
SHA512
db48916ff697cd3dce6459570b11091bed110a29ea906dc570a14d7d51cbe7917562ed8348d1a8407bba8a487642ec58e4f13c3df42d872e166e3c8314bfa828
-
SSDEEP
768:2NfPMSk3K/EzTb/0X8WuFZ4ZJF5PC9O9kX68OMhK3/al:mf05a/CTjS89IFc9Uq68OMoO
Malware Config
Extracted
xworm
5.0
154.197.69.155:7000
2WqEoSYhQbiby3f6
-
Install_directory
%LocalAppData%
-
install_file
crss.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource uidiscord.exe
Files
-
uidiscord.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ