Behavioral task
behavioral1
Sample
1948-3256-0x0000000000280000-0x00000000006F6000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1948-3256-0x0000000000280000-0x00000000006F6000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
1948-3256-0x0000000000280000-0x00000000006F6000-memory.dmp
-
Size
4.5MB
-
MD5
eec4846c90248ff65d830b524c24c5f5
-
SHA1
67021b1dd3a96f5f79a547cf4aa4ff11dda6c43e
-
SHA256
e2a519a58e753ecf3615db5eea5540543689a8c951fe8de4aa3e3d74b2197a96
-
SHA512
c80eacf3bb09f225b6004ea161341e00eb7bc5b3a7a93c2b15ef333e160513224b0a0dd2d5ebf15d74aa31386c9b6b184898525ac58911e51f8444f5a4c082de
-
SSDEEP
98304:NQ3bSgyY4KJapJenfZmDGXHoCpyJyEptzh8n05QHwV:NQhZnxm3ZRhV5NV
Malware Config
Extracted
xworm
5.0
127.0.0.1:8080
101.99.92.189:8080
d5gQ6Zf7Tzih1Pi1
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1948-3256-0x0000000000280000-0x00000000006F6000-memory.dmp
Files
-
1948-3256-0x0000000000280000-0x00000000006F6000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE