Behavioral task
behavioral1
Sample
SolaraX.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
SolaraX.exe
Resource
win10v2004-20250217-en
General
-
Target
SolaraX.exe
-
Size
75KB
-
MD5
bb4297c0a1be56440bc497fb1c276a82
-
SHA1
71db449f4de9b90906866b830ebdabc12c518c20
-
SHA256
7df7abdaaabc41cc080678e71723d5a3ef855abe8c154b87e39664640c8be48c
-
SHA512
a534e7f9107f226d127e0bc8472bb6d35c1eccfd38096ac13f1fb6aef885e52358e6766a604c735a50b0d8f2bb8c9b9bdf1f3e0fa418ccaed5eadadc504deab2
-
SSDEEP
1536:2MuQthAcx9+rFQCb9Hi/bWPUtb/UVbV6foaOirUpPyUS:7L9+rh0/bWPBVUROirUw3
Malware Config
Extracted
xworm
127.0.0.1:34930
minimum-ball.gl.at.ply.gg:34930
-
Install_directory
%AppData%
-
install_file
SolaraX.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SolaraX.exe
Files
-
SolaraX.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ