General
-
Target
GDsploit.exe
-
Size
74KB
-
MD5
a404cf6997c234e386c2c286464299fa
-
SHA1
19ab46be2a1b22b9dee6dd58039242077d89ef32
-
SHA256
234ee4f7eaa9fa4de4c99636f93eceae368fa3b8fc7fd7d0d4ff4dd246cc0c66
-
SHA512
751f257cb96fad5c7ba1021b8f6140e9b113469cb3ff5a143c25e2bf2d89832ef2bb68d252de3bcdc8ea645252f213df570c33d5d17a97f9babe1b06c5c855c8
-
SSDEEP
1536:bJVH0C0q4NXqbQV/MLcRkhAb4YU92mi8D6GG6j2OnNjHAcFcaNG:bJVH0VNab4wzyb4YXmV6GCONjHJRG
Malware Config
Extracted
xworm
23.ip.gl.ply.gg:9024
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource GDsploit.exe
Files
-
GDsploit.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ