Behavioral task
behavioral1
Sample
0x000600000001933e-14.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0x000600000001933e-14.dll
Resource
win10v2004-20250217-en
General
-
Target
0x000600000001933e-14.dat
-
Size
41KB
-
MD5
9cb44f0ad55e6c5b1ab6aaa6bc3522eb
-
SHA1
3f398e116f6e7f86091aeaaae868e3980d607722
-
SHA256
01e6033f82311e8994c61a0237e8df6a4b55a1f17da03e140565608d586895a3
-
SHA512
825dd1fb14eb223c21c786eca03efbbf8d89347188c37e60995cd9e0e55d90cb14c9262aeb5d7523ccf91fdeb0f14c98cee530585b791ddeef40f33729d8a9ac
-
SSDEEP
768:yRPD9OQhx/B03Tw4xqdVFE9jZOjhAbO7JjfubMP:yd9OW/03U4x8FE9jZOjeypfubMP
Malware Config
Extracted
xworm
5.0
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0x000600000001933e-14.dat
Files
-
0x000600000001933e-14.dat.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 680B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ