General
-
Target
$R7DQTGG.exe
-
Size
197KB
-
MD5
23ae846b601cdfbc78da67bf61e265fa
-
SHA1
8104966ae762225d23df128b2cf8bde8145bbf01
-
SHA256
a67721023e1aea8b73d8614e6e29e5108152f510619516da1648dc03cb7de122
-
SHA512
7e002c88090b5468ceb186e68c5ae34ab8ab22782bbd33387d1c665dcc8770e25ae2fe7243fbd94dc5d2c277650a5d90961bef6ded616e9c6629a659494d1c36
-
SSDEEP
3072:CLq2PnaybVqQQK/Ec/OaW3JRUGKXs+S++7KFSbxeY+qDDrMI:eq2bpg8GqStKEbxI
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
x69Microsoft Edge.exe
-
pastebin_url
https://pastebin.com/raw/zYgpCQBC
-
telegram
https://api.telegram.org/bot7322335748:AAEr-qkbNoi4AH-VkGzWTsoAJ0Jx3HkKwbk/sendMessage?chat_id=7763830849
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource $R7DQTGG.exe
Files
-
$R7DQTGG.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ