Behavioral task
behavioral1
Sample
bSgJ.exe
Resource
win7-20240903-en
General
-
Target
bSgJ.exe
-
Size
33KB
-
MD5
808e7cd14ef26b8060beb85b883e6426
-
SHA1
47f2bf06551cddf4734eead636327b8bef29b7b6
-
SHA256
83d944990a78952d5defbcc1ab47a9f9464a6e84890816a01310bc2d2f97b2c1
-
SHA512
861683f3b28c3e0fd8855def6560874aa2086576b15985c5279bb9a527361f2b13ca03e2dfc19c001ce4072c133268add109b3c94c4ce029aa45431c62be7909
-
SSDEEP
768:8o4fK1pDGkptwyZScCBSUapNgqVXU/kZl+Bcgo5tlTF592qO9hLdRP:9DGkptwyZScCkU4rRUsZcB5o5HF592q8
Malware Config
Extracted
xworm
3.1
tcxerr.duckdns.org:6677
RSH70dBwgOkTVB0X
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bSgJ.exe
Files
-
bSgJ.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ