Behavioral task
behavioral1
Sample
svchost.exe
Resource
win11-20241007-en
General
-
Target
svchost.exe
-
Size
34KB
-
MD5
3b23fa8d77f5ca0f343bb2af1e5baec5
-
SHA1
881019b48e506d184c43606284761ea80cae8c56
-
SHA256
db762280521d09e3f82f42b1cf2cef56d8512e6082035879086bbbdabf699876
-
SHA512
cb12e239d85df7cd374a075112a1edd4b59561104e9253d27ac641cb39492344e935b92647e73e43e3b05eb3e6d023272a1773d2a0f3f0a0707bf94a07ea9052
-
SSDEEP
384:LSyXlquOae6oKoBmoDnnGvBLmlgCwvHixdTD2VR8pkFTBLTIZwYGDcvw9IkuisGM:WyXiBDAtYgC4CaV9FZ9j8TWOjhv/4C
Malware Config
Extracted
xworm
5.0
lefferek-42016.portmap.host:61672
budget-compiled.gl.at.ply.gg:61672
onfACwiiMT0rgyTy
-
Install_directory
%AppData%
-
install_file
DiscordClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource svchost.exe
Files
-
svchost.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ