General
-
Target
132.exe
-
Size
56KB
-
MD5
1bc4e67e8e5636713df1be6d4c821343
-
SHA1
ab2e070e4a1e70ff33e2a17c0ce17eb3e4b2823d
-
SHA256
a5976230b3e5d8efc40dea84c992209fccee38c06c310ee881cd8d1b0872ed0e
-
SHA512
fe032a075b5e13d6a1b1e3101c92b4330030d31f507f9bf4a3482f71d8670a3594ca93ce7ca809fd41f2a38d9b71eeb5faa036bcd9f2d97297e21aad05874be2
-
SSDEEP
1536:/gJbKVjEfb1fI50/igd7RzbnbGC79Obwu:IJIjWhfI50qg5RzbnJhObwu
Malware Config
Extracted
xworm
3.1
147.185.221.19:26229
-
Install_directory
%Public%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 132.exe
Files
-
132.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ