Behavioral task
behavioral1
Sample
bk-fixed.exe
Resource
win7-20240903-en
General
-
Target
bk-fixed.exe
-
Size
76KB
-
MD5
9ba96801ef7763ec2cd3511780cd20b3
-
SHA1
22225abd3ae38fbe758d549e574ceeda962e1e7c
-
SHA256
46eb679dd45be1e09f1b0aaf6bbcff714808fed5c561b55214f962b664d4b925
-
SHA512
12a0d54879740ea84ed1965dfd54042b9f1c1c3ea7acf458500c5ee44b674d950bc338c40b4bad1b22c45154f88b066bebb4fb32439f77a4e246b444b943158e
-
SSDEEP
1536:fo3l2Rja/FuPlY932zcmncWZHAucvAlbgMF3WLc4gGiQOVkM95cT4gSR3:fwiAmnLFcvgbgMF0OVV5Z3
Malware Config
Extracted
xworm
10.0.0.97:7000
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bk-fixed.exe
Files
-
bk-fixed.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ