Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20230703-en
General
-
Target
XClient.exe
-
Size
31KB
-
MD5
9876e0ed31dc4384dfec99d649eb587b
-
SHA1
d75d7f905e43866fd1361bc56296f4ac5aac1a86
-
SHA256
9acc59e5318dc364637b3ecc4fe8d5b6a9aed3e00fb82933bbc450dd97063f3f
-
SHA512
f874bde059baae82bc1bf57ac38cf90cfe13a4e087d5ac7bc43ce4dd11559192561a4cfc10022638027f1cb1904d0c532d7b35bdde3356a514e7fe162506c1ed
-
SSDEEP
384:7uTNqCr4TOXqMkc7qiPRr49hL5vwDs2ETIifHR+gtFqBLTiZw/WNCvK9IkVugxO3:Ck2lUD5IePfHZFr9RdOjhk/3vu
Malware Config
Extracted
xworm
WNIKO1-39869.portmap.host:39869
n0Mw24jO6Jcuye2F
-
install_file
USB.exe
Signatures
-
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ