Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20231020-en
General
-
Target
XClient.exe
-
Size
43KB
-
MD5
58064bfc762e60cc73c67461849efa23
-
SHA1
2fb82be7c591278286932d10db892c9012dc387c
-
SHA256
1b3b8a40f12c35db7c850be141d687126f4df8104fe266fe6fbce594ecaa08fa
-
SHA512
2eb4d7fdea16633c4fd6a74803769626b9b2c0c7a7bd86b77df9e9a5b8cda77a248407159b2e72fe5392eae79f15e5d4a912e18f8edc31908e56f4ab607ab717
-
SSDEEP
768:t6rui8hoxxS/UKtMtUb+Fa+B0FFRPM9W96ZOChhvubWQ:tsB8hobsftvMGF69W96ZOCz2qQ
Malware Config
Extracted
xworm
5.0
147.185.221.17,browse-classic.gl.at.ply.gg,186.50.246.95,17.ip.gl.ply.gg:38264
OgqyvwoUGRsJ9XWL
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ