Behavioral task
behavioral1
Sample
x2woof.exe
Resource
win7-20240903-en
General
-
Target
x2woof.exe
-
Size
314KB
-
MD5
a5ba086a31a86f52e15f428b7b86366b
-
SHA1
5e7e4c2f1580b464be77ab7c03b0fefad70b901e
-
SHA256
4441cb86070e91e5c3c1d58c7043cef87f8c07015327ac49a9512b3f61a33a31
-
SHA512
aca4e8e9a09e2062330dd5f021c4175fd1cb44c8b2b42386e5f0dead8c74b872e75aa80f709deb96215216848afac87d68fd6ce86a02cfd7a5808c148b65fe2c
-
SSDEEP
6144:Hf4QpI7++bazupxp2a3fTnrrBrkRqPaCY+zoUf/f92Oq7ElR:HfuSBzupxplzrFPcq3xqkR
Malware Config
Extracted
xworm
hope-asia.gl.at.ply.gg:35710
-
Install_directory
%ProgramData%
-
install_file
x2woof.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource x2woof.exe
Files
-
x2woof.exe.exe windows:4 windows x86 arch:x86
Password: sigmaballs
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 230KB - Virtual size: 230KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ