Behavioral task
behavioral1
Sample
2ad0b8e8c41f65839f0c2dda4e2a39b0e8a844ec3d67fef7e79a690ab56b4982.exe
Resource
win7-20240903-en
General
-
Target
2ad0b8e8c41f65839f0c2dda4e2a39b0e8a844ec3d67fef7e79a690ab56b4982
-
Size
60KB
-
MD5
5b29d55280fbe57e4a9c22c155288061
-
SHA1
5456a06ad792bac192f961ac4901227f6825084e
-
SHA256
2ad0b8e8c41f65839f0c2dda4e2a39b0e8a844ec3d67fef7e79a690ab56b4982
-
SHA512
9ba6d4effb2a304f047149f6fa199607c24338460cdf9c78cfed22d07cb15f087e4d7e28d8bb19949dc4f5a6536b4ad2b4590eb4991ecbad69509411d8236b36
-
SSDEEP
1536:fZBkdsU4s4YLnN9054AxcRkbu79EnhO023fI:bk5LnD05ikbuxGO023Q
Malware Config
Extracted
xworm
213.136.90.188:7000
-
Install_directory
%Userprofile%
-
install_file
Microsoft Edgs.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ad0b8e8c41f65839f0c2dda4e2a39b0e8a844ec3d67fef7e79a690ab56b4982
Files
-
2ad0b8e8c41f65839f0c2dda4e2a39b0e8a844ec3d67fef7e79a690ab56b4982.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ