Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240729-en
General
-
Target
Loader.exe
-
Size
33KB
-
MD5
efcea8cb2313b8471150095b3bfafd83
-
SHA1
5cf8bd1f2fa2b0d35ee926397747b5d33aaa47bf
-
SHA256
553d18b61aab79fe933bbef9fe06108d0b41e058725110a4d6bada32d71c83cd
-
SHA512
8ab6ff7e20671b0ffc88b2b47328075b7846b0b67abb8d54634b8f93d5d3f6b4a5502505f7470177f562c600b9c6e24e90712fc887af4729008c66d63f2eef3c
-
SSDEEP
384:iE8PQ9Ba+vNuntf98d6ILj7BM42pfL3iB7OxVqW9SRApkFXBLTsOZwpGN2v99Ik4:cUa+vNohsXm42JiB70qVF49jnOjhVb7
Malware Config
Extracted
xworm
5.0
147.185.221.23:25863
Bx3upfPCf2NXhUgx
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Loader.exe
Files
-
Loader.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ