Behavioral task
behavioral1
Sample
376dbd9053eda767a78ba64902d613a6.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
376dbd9053eda767a78ba64902d613a6.exe
Resource
win10v2004-20241007-en
General
-
Target
376dbd9053eda767a78ba64902d613a6.exe
-
Size
910KB
-
MD5
376dbd9053eda767a78ba64902d613a6
-
SHA1
0e1c2932e1ffa95e08b26701d3712fa73215b7a7
-
SHA256
dc6f6cfe00f36f062e9c239ce735ce74adac8a99924855d9be14122ab950f624
-
SHA512
9f26eaf5d115ee85b619f5a5c4216e5e946e36173c6e76d147dfcd3ffa08cb19e3506383c176ca44c5b218862b09e3f1e4b88af8da831878fdd7e462fecff09c
-
SSDEEP
24576:rjdls6XgBl0S+K7VQy6yXiJC0ABKPamoLi+t9RQAPxEhl3q8gBl0S+K7VQy6yXik:fU6XgBl0S+K7VQy6yXiJC0ABKXii+t9h
Malware Config
Extracted
xworm
5.0
meterpreter.ddnsgratis.com.br:4443
hBFuAxRY13vkdtFY
-
Install_directory
%AppData%
-
install_file
svchosts.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 376dbd9053eda767a78ba64902d613a6.exe
Files
-
376dbd9053eda767a78ba64902d613a6.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 907KB - Virtual size: 907KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ