General
-
Target
XClient.exe
-
Size
30KB
-
MD5
8df36cd5a70cfa7c39b4d444a55446b2
-
SHA1
349cb63e10b3e9759ad23719885580e0162b8a67
-
SHA256
6329d3208b8962566aa0a1e75ac028480536b629ef9a890e2a5e62a03c798514
-
SHA512
ede62943a6705257e116795499abc755d9dffb1f580037f80e915c006d0e162861a39309b893ae62dbf11bea476cdf54a33c8feb0a9516496b397af3a29dc05d
-
SSDEEP
384:L7wTA+5OfPgEBQqWvfcQLZe3s80hYACSqRSMg2uRugtFuBLTIOZw/WVnvn9IkVuU:LrgECfLH8MYAoRSF2uBFE9RFOqhQbC
Malware Config
Extracted
xworm
soon-lp.at.ply.gg:12709
yMjAPR9KstIe0xN0
-
install_file
USB.exe
Signatures
-
Xworm family
Files
-
XClient.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ