Behavioral task
behavioral1
Sample
2180-1-0x00000000002F0000-0x000000000075A000-memory.exe
Resource
win7-20240903-en
General
-
Target
2180-1-0x00000000002F0000-0x000000000075A000-memory.dmp
-
Size
4.4MB
-
MD5
5df7a3201da0da17e30ba3e59cd95a48
-
SHA1
d53433eca9121359d50180d92c68944d00dd56e6
-
SHA256
cbf8d272e5e3b70d90186e5cd47523afbd7fc2a20003928c90f23bdb761ffb29
-
SHA512
3958bf5c1a75f61e633451e6ccfb41cf636230ac3dea45408712e6414040684cd1cff306316d6592cadab95153bdf75551cd4fdcc9055b386222b8a9e60c2a67
-
SSDEEP
98304:+KoJ0hutMmvZiOJqzhdatyXJDn+ZoJVZUiMd7+FttcWOtojJ:+nZZ+dagXJr5TZUb+/yfqV
Malware Config
Extracted
xworm
5.0
127.0.0.1:8938
rrUYjJlOwwu2jjkk
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2180-1-0x00000000002F0000-0x000000000075A000-memory.dmp
Files
-
2180-1-0x00000000002F0000-0x000000000075A000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE