Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20230915-en
General
-
Target
XClient.exe
-
Size
166KB
-
MD5
3d831633d3b023d25bed994439f942ea
-
SHA1
b18bc09fc05a45c77a0e6a5bf702e959667450f8
-
SHA256
b39bb6cc14449c8438d05b31ea62842c266f435c46813613b1ec61dfda909673
-
SHA512
89b22c6d1d150cc9e95f12b9c0d28c3624cd090ed9c079ef7528e94d92bc6766e21853b35d647c8b6f5255a172b4b53f6fb9fed8c9b5d93909b627d4dd241494
-
SSDEEP
3072:4YxKjIRdG2UR0LtZbyosWmcOX6TM+lmsolAIrRuw+mqv9j1MWLQbs:4oKjQ4GbyWc+lDAA
Malware Config
Extracted
xworm
3.1
federal-true.gl.at.ply.gg:42772
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ