Behavioral task
behavioral1
Sample
8a3560cc3874da4b2706ec801addf92a5e425c03fa54d8d105d37b24c0185268.exe
Resource
win7-20241010-en
General
-
Target
8a3560cc3874da4b2706ec801addf92a5e425c03fa54d8d105d37b24c0185268
-
Size
67KB
-
MD5
4779be9e708508f643b31d997d0c26ff
-
SHA1
8f590329114fdf67ee61686e85642bd4f3ff2a60
-
SHA256
8a3560cc3874da4b2706ec801addf92a5e425c03fa54d8d105d37b24c0185268
-
SHA512
f6e344e09b743a4e5cbd1d861e57bdf7928a6eb5ed0b580557b99130b5f1012e2f539ff1a4ad1f7fb8f5950dfe1ce53fe9347d02fe77e9ed35112e580724b9c0
-
SSDEEP
1536:JPamCStxokeVCh4bpBSQZn2Tm3g6ePOkESeADq:FBCwxH5h4bpB5SKYPOkESe8q
Malware Config
Extracted
xworm
185.84.160.159:3306
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a3560cc3874da4b2706ec801addf92a5e425c03fa54d8d105d37b24c0185268
Files
-
8a3560cc3874da4b2706ec801addf92a5e425c03fa54d8d105d37b24c0185268.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ