Behavioral task
behavioral1
Sample
sample_test.exe
Resource
win7-20240903-en
General
-
Target
sample_test.exe
-
Size
62KB
-
MD5
dd57ff9af20800326dedbe1943379732
-
SHA1
42e72c948ad40dec45c88bc025fb64116145690c
-
SHA256
1d7ea35e01bdf4819cdeaef573f3c7169d20417e26e9877ce338c28dfb6cb820
-
SHA512
0afbc31aad0fe22fab6ef7f17c66653f3bbac7221813a8dbe24d17763df70cdb70d9863daeb5852ec3857477bf419de1220eaa552c2b16aa85737e9536d3f5b8
-
SSDEEP
1536:CPYl0v8/QaBWcCDnu1VbNcj9pWO3qByafa1:CPVXaBWDnu1VbNi7WO3qUa2
Malware Config
Extracted
xworm
147.185.221.16:40164
147.185.221.20:40164
-
install_file
System Volume Information Prefetch.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource sample_test.exe
Files
-
sample_test.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ