Behavioral task
behavioral1
Sample
352002d24635674ccdd895f0bc0220747ae230ab5b04d11449bed2091ee73060N.exe
Resource
win7-20240729-en
General
-
Target
352002d24635674ccdd895f0bc0220747ae230ab5b04d11449bed2091ee73060N
-
Size
41KB
-
MD5
7de81c94c25bd97245fe642ee7f9e390
-
SHA1
71f6c27ae7d1536b2f75b2d50036ca63b069979c
-
SHA256
352002d24635674ccdd895f0bc0220747ae230ab5b04d11449bed2091ee73060
-
SHA512
5544e6a6164be29d76d515bfe9be9103332d716a76f7c729744ecbdf120ce0663cf7d10278f69306961f4428e34bec1bf32c7075e6bb8c6cdaaff40f64f83522
-
SSDEEP
768:JmrJDweBDuOkScrbsN/x6WECAr43MxfJF5Pa9p+x6iOwhc3/ib8:J0DwewicrbsN/YDRrNRF49Ix6iOw6aQ
Malware Config
Extracted
xworm
5.0
ads-partnerships.gl.at.ply.gg:44465
1dxcyIcfZ2aSbusk
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 352002d24635674ccdd895f0bc0220747ae230ab5b04d11449bed2091ee73060N
Files
-
352002d24635674ccdd895f0bc0220747ae230ab5b04d11449bed2091ee73060N.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ