Behavioral task
behavioral1
Sample
609698e10e28be5a96c3914375be5b804ddda61b0aeaf3887efeaab06b13a8cc.exe
Resource
win7-20241010-en
General
-
Target
609698e10e28be5a96c3914375be5b804ddda61b0aeaf3887efeaab06b13a8cc.exe
-
Size
80KB
-
MD5
38167adb796f74a8ccbfda11c7db9758
-
SHA1
26f3e32b69708912e91f34b3fbfd0bbf55902772
-
SHA256
609698e10e28be5a96c3914375be5b804ddda61b0aeaf3887efeaab06b13a8cc
-
SHA512
6832a17b628334b4680b66f919d51249a0831399e78a7fbb4f584fdba067d50107e43b6de551262e7affd3ee79dea554865ce48596bdbddaefde493a902f4e14
-
SSDEEP
768:ZDb0I+a4DL7zg2Kd3yG92RlFWDb0I+a4DL7zg2Kd3yG92RlF:ZPoECV3FWPoECV3F
Malware Config
Extracted
xworm
xworm1120.duckdns.org:1120
D0iCsL6PUuq7iVxc
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
RevengeRat Executable 1 IoCs
resource yara_rule sample revengerat -
Revengerat family
-
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 609698e10e28be5a96c3914375be5b804ddda61b0aeaf3887efeaab06b13a8cc.exe
Files
-
609698e10e28be5a96c3914375be5b804ddda61b0aeaf3887efeaab06b13a8cc.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ