Behavioral task
behavioral1
Sample
74a741bc82a1dfd63433d64999ea159987b848183b89a6aac3c4ff10a6d26885.exe
Resource
win7-20240903-en
General
-
Target
74a741bc82a1dfd63433d64999ea159987b848183b89a6aac3c4ff10a6d26885.exe
-
Size
32KB
-
MD5
7d2a1ef1f9df2fc7e2c2a48018df18ad
-
SHA1
e55632b6b51fdf3663beaad68069bb8ef532ba88
-
SHA256
74a741bc82a1dfd63433d64999ea159987b848183b89a6aac3c4ff10a6d26885
-
SHA512
7140d9c4080f2e1f11225f8bf8e6e82c539a24881abb3a01a760adc384faf772f8623c8c4e8bd7a3c113330761864631dcbe9697529d23e81624f84267951c23
-
SSDEEP
384:+lRmhGD91SluSWhnHHxzLmY73Tm2eaFO4FzRApkFTBLTsOZwpGd2v99IkuisKK9M:eRPD9OQhx/B73Tw49FzVFE9jCOjhXbX
Malware Config
Extracted
xworm
5.0
products-profit.gl.at.ply.gg:36450
4s4X91Qf4LTgCiRy
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74a741bc82a1dfd63433d64999ea159987b848183b89a6aac3c4ff10a6d26885.exe
Files
-
74a741bc82a1dfd63433d64999ea159987b848183b89a6aac3c4ff10a6d26885.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ