Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10-20231220-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
XClient.exe
Resource
win11-20231222-en
General
-
Target
XClient.exe
-
Size
139KB
-
MD5
1b7fbb6181468265d620acec2df45cb4
-
SHA1
8b05e8a207e9d66b31d25bde0da7188e9f576570
-
SHA256
08e4bb8663a172998b49a51329126ed1b9062cc281ee6bccc52d97f30ff9f72e
-
SHA512
9c183e220a316e2d6e61189c6f7edee8a855f4c8480192e5b999d47907c30c8729d6814e57f14046fd5991bb8d43932a4d7d3e4646ecaedab16c59522d945b02
-
SSDEEP
1536:jtdqysZHm2texipgE1MbeAFOFUa6+UOdeDuLHKzV:LsHnuipKbeJLUOde6uV
Malware Config
Extracted
xworm
5.0
remcon.ddns.net:8456
5.tcp.eu.ngrok.io:8456
147.185.221.17:8456
february-wages.gl.at.ply.gg:8456
remcon.ddns.net:08456
5.tcp.eu.ngrok.io:08456
147.185.221.17:08456
february-wages.gl.at.ply.gg:08456
-
Install_directory
%AppData%
-
install_file
Dlscord.exe
-
telegram
https://api.telegram.org/bot6848470626:AAHoDIZqXorMkSbVro82UUQ5bf4dsmVIYyc/sendMessage?chat_id=6274985126
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ