Behavioral task
behavioral1
Sample
17280747651c65888a5d5ac545724e489642bc491cc1ffd341e9d7640d9cf7ca383b5c9019315.dat-decoded.exe
Resource
win7-20240903-en
General
-
Target
17280747651c65888a5d5ac545724e489642bc491cc1ffd341e9d7640d9cf7ca383b5c9019315.dat-decoded.exe
-
Size
72KB
-
MD5
b5fdff62df0afd88fc8173df7201e416
-
SHA1
2bb2a6d68e50d3e7e263a1549ce82696f8d1e9e0
-
SHA256
8abca677b866c3f7bb95524230d490a9f33e98d1697a9f25bd0798f3e016f936
-
SHA512
8b811ec49747b269a38cab690a79d461b38109da7b5eb37c5eb8bf27cb11dc803f48a7bfc4424ab773b3bcad086e6458c6ae7b8d9360b008fed4a31583b39177
-
SSDEEP
1536:d8V8eCI/+l22AylDL27+bHNBVxpfaa+ni44+OsU2X4iWU:dxI/MZ3C+bHzsji44+OnuAU
Malware Config
Extracted
xworm
toskaadmx.duckdns.org:7000
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17280747651c65888a5d5ac545724e489642bc491cc1ffd341e9d7640d9cf7ca383b5c9019315.dat-decoded.exe
Files
-
17280747651c65888a5d5ac545724e489642bc491cc1ffd341e9d7640d9cf7ca383b5c9019315.dat-decoded.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ