Behavioral task
behavioral1
Sample
2024-11-06_e37f07972d52cdb34edc686d6bea43c9_hiddentear.exe
Resource
win7-20240903-en
General
-
Target
2024-11-06_e37f07972d52cdb34edc686d6bea43c9_hiddentear
-
Size
130KB
-
MD5
e37f07972d52cdb34edc686d6bea43c9
-
SHA1
0a8fe26602dff689807f62d390e142725b225bf9
-
SHA256
04e7a61270808729b5f86f0c56d18e54a2f716d2e11ad9da358168b4f6e47266
-
SHA512
97f7913da41f14008f16f62d1a59f141bcc9fc34c44e0bcd2d954887b237d96dd509c037ca38c82ff98fece2081e53a2672ea5d270a9c636c7000569f44c0758
-
SSDEEP
3072:fd9KIAFE9jpOj4M+lmsolAIrRuw+mqv9j1MWLQI:fUE9s+lDAA
Malware Config
Extracted
xworm
5.0
helloworld22.zapto.org:7001
bulQIY3oCXFLsk45
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-11-06_e37f07972d52cdb34edc686d6bea43c9_hiddentear
Files
-
2024-11-06_e37f07972d52cdb34edc686d6bea43c9_hiddentear.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ