Behavioral task
behavioral1
Sample
Super Calorgragsi.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Super Calorgragsi.exe
Resource
win10v2004-20241007-en
General
-
Target
Super Calorgragsi.exe
-
Size
63KB
-
MD5
ce8a691e149f43bb90a6590f0a98512f
-
SHA1
fb7f27e02a4a566c0d0c8a2d1009f12d4755e1a1
-
SHA256
362eb6060817d7cd319f94f2762eea17e73e52d60a75015d5f2da40c32939ef1
-
SHA512
c310d33d8b6d737d867062bb3e79c1a6fd7e94b5008320e535e3b3200a00dc4bb7839e1b9f550ff5f623cffc72eae8720ec792f3fb3d351966b7d24f61da9917
-
SSDEEP
1536:78YOpXEp3Nh+btUkboR2uyFGnWHOh9Pqyt:oXUAbOkboRfYGnCOhUyt
Malware Config
Extracted
xworm
Phnxss-27839.portmap.host:27839
-
Install_directory
%Userprofile%
-
install_file
Windows Security Notification.exe
-
telegram
https://api.telegram.org/bot7358011073:AAGdUduenjLHLDVW3OYWkXisH68mtspgA2Y/sendMessage?chat_id=6860608587
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Super Calorgragsi.exe
Files
-
Super Calorgragsi.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ