Behavioral task
behavioral1
Sample
1456874529dc30f09926a16774b16bbbc9d883e09d780e071a78b8f32edfaa5d.exe
Resource
win7-20240903-en
General
-
Target
1456874529dc30f09926a16774b16bbbc9d883e09d780e071a78b8f32edfaa5d
-
Size
51KB
-
MD5
786ca13c728d2be9656c9808006cff4a
-
SHA1
df4445132e799dbb2cc203697c8ac0b547f06cb5
-
SHA256
1456874529dc30f09926a16774b16bbbc9d883e09d780e071a78b8f32edfaa5d
-
SHA512
ee045dfcb010d8144cf92b7ff816be591389584d794f0f3be722beef61a9e3c61267814ea24278f80a1ade9483649c08639e67a72137e695152db5df640f4428
-
SSDEEP
1536:mtbuCiL0WXvvg1FI9AY6vOw/F4+MUcyKn:mt/iL5vvg1FI9AhOwq+MUYn
Malware Config
Extracted
xworm
5.0
23.ip.gl.ply.gg:7728
MSa5AIf8m9cGispj
-
Install_directory
%Userprofile%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1456874529dc30f09926a16774b16bbbc9d883e09d780e071a78b8f32edfaa5d
Files
-
1456874529dc30f09926a16774b16bbbc9d883e09d780e071a78b8f32edfaa5d.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ