Behavioral task
behavioral1
Sample
dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe
Resource
win7-20240903-en
General
-
Target
dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe
-
Size
86KB
-
MD5
de16a00b42e978595cbd917d10ceb984
-
SHA1
fccc091d3ab6b4c26449e3a4ad0bc5eda73b6a7c
-
SHA256
dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78
-
SHA512
aea3e18957bb3edbcf6a08fc43ed0e7792cfcd5a3c1a4b8a017b92e0467129a3879d3282ef73b505e49440fb34f294fc7c50712f6c8bd11b55d710004fed3122
-
SSDEEP
1536:EW8TIhv1Cz1WeVB/afL8IT+DQX9Ea+bnJEsmTtjD0H6JVapKVX5OwoKxA35:ER0Z1VhLTFr+bn2z1D0OVacJOXKK
Malware Config
Extracted
xworm
80.133.88.87:8848
-
Install_directory
%AppData%
-
install_file
BrowserUpdater.exe
-
telegram
https://api.telegram.org/bot7409084272:AAGfvawizs5psSM16en9CLFzI0ZQnCNB3SA
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe
Files
-
dc535675df47e762a771611cbd06f1ccb2b1962ccbfca914a3448fef9ffa9d78.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ