Behavioral task
behavioral1
Sample
5ad6806628708095957c45a7f728f941d9b436a25f3f0d2147274403fffd1045.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5ad6806628708095957c45a7f728f941d9b436a25f3f0d2147274403fffd1045.exe
Resource
win10v2004-20240611-en
General
-
Target
ee1ffa80e2398a0f01a99856c1189b21.bin
-
Size
161KB
-
MD5
19120157983a81927934ed82991f586d
-
SHA1
014c67196a838f04eaa6f4bf2488b24874223d8d
-
SHA256
282cfa2b9f5afedbf53c6a69f8eda2670fefaab9962c6521ccaf2acb2f1bb8ca
-
SHA512
0f536b8d94c27023bc1801f031fd2610506eec46fd154c4bdcb94c44ad0be48a2141dc122b9b1570142d20fd0b28156ce52a5fb5df7ae04305f0adc76e1c71fb
-
SSDEEP
3072:B5LaDfcYh973At3Hu4gx2j6Ca7AAGYp924/V3OwZHN5yOn3HT8K7+PHr8Kbotz:B5EkA7wVHu4gxY1AGE924t9NvD80+/rw
Malware Config
Extracted
xworm
154.197.69.131:7005
-
Install_directory
%AppData%
-
install_file
crss.exe
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/5ad6806628708095957c45a7f728f941d9b436a25f3f0d2147274403fffd1045.exe family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/5ad6806628708095957c45a7f728f941d9b436a25f3f0d2147274403fffd1045.exe
Files
-
ee1ffa80e2398a0f01a99856c1189b21.bin.zip
Password: infected
-
5ad6806628708095957c45a7f728f941d9b436a25f3f0d2147274403fffd1045.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ