Behavioral task
behavioral1
Sample
808-28-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
808-28-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20250217-en
General
-
Target
808-28-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
62d2ea7baee7bce8b1942de7b1f8f0b5
-
SHA1
31ab8974043a55e11456f17c50f291179e8bf40f
-
SHA256
b3f63049343f14ddde5f6783722dff337c29a3f3cd32aa266da14b391c39c384
-
SHA512
efc8d8e088f3641bc4c8d12836daa8d848f6117111b3c48fd54f5ff802764683423c35af71321ac4384dfd204bc6f74c818e6fc4d631402ffbb813b6bf3e1cbb
-
SSDEEP
768:0WZQ8V0L+aJxDPj/DcXA5Fr277qWuFNg9C6nH6+OAhXYgXTsv+:vZQ0aPDY6I7AFW9XH6+OAWgQm
Malware Config
Extracted
xworm
3.1
193.23.160.31:1760
H1hx0NXdYm1SIVHw
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 808-28-0x0000000000400000-0x0000000000412000-memory.dmp
Files
-
808-28-0x0000000000400000-0x0000000000412000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ