General
-
Target
setup.exe
-
Size
41KB
-
MD5
8eab945fee9e24992a9f4175990b1f19
-
SHA1
b41956b072c8bf20fd71fab69b9fd3460da13306
-
SHA256
484a30b81cf3769281feb290886357834d18c2022a00394a5c591417fe0c5603
-
SHA512
52b4063529342d62de72f75ffafbf9f4fe47993f5facb012fd3990662d2c08d5fc426183321ff6869cbdd2d30aec77eabc75cc5bc8680fd723b60afc0b48cd29
-
SSDEEP
768:psydlfynBbCJvx5Ri0NTxtYJF5PJ9OACd68OMhd3E1V:psyfqnBbCTri0xfkFz9hE68OML0
Malware Config
Extracted
xworm
5.0
members-korea.gl.at.ply.gg:11075
9HyyMtIn425lv2KS
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource setup.exe
Files
-
setup.exe.exe windows:4 windows x86 arch:x86
Password: nigga
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ