Behavioral task
behavioral1
Sample
1730880247cf66167bcfd0746932f87db200bfceb4d3c06bb32722efa7cbc37412fdc49363938.dat-decoded.exe
Resource
win7-20240729-en
General
-
Target
1730880247cf66167bcfd0746932f87db200bfceb4d3c06bb32722efa7cbc37412fdc49363938.dat-decoded.exe
-
Size
40KB
-
MD5
816222a137d907fcbecdf96c8955ce3d
-
SHA1
599308ee6ee461d8f37eac5798a76168b3f4fba1
-
SHA256
5670f6bd75a700b18f0c5855fa3464a5cc6efaf50dac9416db56bc9b6f75e002
-
SHA512
f622adc2fa410a4a1b22f921c4ef94fddbe29634c0fb3a0dd5c82129da605c3986780ce518ea284ffca6365f5b4c56296fd536dc328173a9fea3cdbbe05ec1b3
-
SSDEEP
384:9Nb3g/Yf0jemOKXQQpImnMRzhS8ct7zuPgg8Kx493yBtrLaWGPjxLCPOnsSZwH0d:b3gK0jem9lARI7zg2Kd3yTPERl2
Malware Config
Extracted
xworm
xw0room9090.duckdns.org:9090
sXU9wet90BBe1iOI
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1730880247cf66167bcfd0746932f87db200bfceb4d3c06bb32722efa7cbc37412fdc49363938.dat-decoded.exe
Files
-
1730880247cf66167bcfd0746932f87db200bfceb4d3c06bb32722efa7cbc37412fdc49363938.dat-decoded.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ