Behavioral task
behavioral1
Sample
NezurBootStrapper.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
NezurBootStrapper.exe
Resource
win10v2004-20240802-en
General
-
Target
NezurBootStrapper.exe
-
Size
59KB
-
MD5
6f34954a7562858ef69c14f68afd9f14
-
SHA1
482a3ae892f241107e510fffa6001dfa7b941953
-
SHA256
9e5a2408aaf570ec2bb11638f7cf1e7299ca059ce2267d047428346543157540
-
SHA512
7ac07b80d1d06776efa4770764c680715c420dec9b6e25ec18b006c0ab46f55e033ad6c7c44dd03c3566da720fd5c21f34b613358acc65c5f551d5ac08566cae
-
SSDEEP
768:4vnC1PzVI2N5KC0mQpNWGwEVNoxau7gp39ykqVpZ5Z6kbpTuzsZWf3NOHEprTKPt:+I+7QyGLgDqDckbpTEsZ6r0cO7b
Malware Config
Extracted
xworm
195.88.218.126:2404
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NezurBootStrapper.exe
Files
-
NezurBootStrapper.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ