Behavioral task
behavioral1
Sample
Krampus.exe
Resource
win7-20240729-en
General
-
Target
Krampus.exe
-
Size
60KB
-
MD5
2fccd6bfccab646df29691a508029a05
-
SHA1
f9d6a3aa63eefab7b227e10ac767367b562139d2
-
SHA256
57a21afc8268870f6b98d2e8ae8676f3c089e8b17d94d12025e03519f12955f0
-
SHA512
ade549fd5b5e79623c578e3e74895d1d8e7880e888b8cd562e5c4117605fe590efe4a40cb4075d030e4cf5900c4c4bcbef64f1f6e7efe9d4a3e1184d1a726bd5
-
SSDEEP
1536:OyXbySczQdKSRH+mCYI3iATBhkbVkoe8WoVOz/u7+xH:rXuTRIemCYk/kbaT8vVOLJ
Malware Config
Extracted
xworm
127.0.0.1:7000
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Krampus.exe
Files
-
Krampus.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ