Behavioral task
behavioral1
Sample
Kunzi/KunziSpoofer.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
Kunzi.rar
-
Size
42KB
-
MD5
b64b6d4604f2853cef225a1f750d8dc2
-
SHA1
a29a39a05f90348e22ef83b4749b5bfd2243868f
-
SHA256
cb0c7cc189c3d6e549323887c5baec9cfe91252da69a2aaf3d7dfff07c7f6806
-
SHA512
037c9ecd08398a2dd6b43d458ec47566b7645761944cdd416942bc4a37caea978dd109f35c15c8acdb2c8018bf126320971f771cdb3437baf0266a561a397bef
-
SSDEEP
768:WLPecqERMFUzBeN7dAL1X2zJZfMV9vZTNTQVVyLDuqlqdFCJ7pm6XlaphdI:WahLFwBeNgXVBEfauqlqdMScanC
Malware Config
Extracted
xworm
defined-literary.gl.at.ply.gg:39055
-
Install_directory
%LocalAppData%
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule static1/unpack001/Kunzi/KunziSpoofer.exe family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Kunzi/KunziSpoofer.exe
Files
-
Kunzi.rar.rar
-
Kunzi/Kunzi.sys
-
Kunzi/KunziSpoofer.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ