Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20231222-en
General
-
Target
XClient.exe
-
Size
74KB
-
MD5
11fcf389e5705917f6e5e7dc2c5064cc
-
SHA1
79c1fcd1e7d1fdfcbbe8c8f71f6af28b2260d7f7
-
SHA256
7bfc3011c23a205d6a4d99dd40983bd6212938a77ba8af17d6e2f7a5f6191776
-
SHA512
81c0409c644502c2fcd6b08bbfa298754dec1bbd0d7f783c7fb445dc66c0434e74ba4f71cc98fcb6a8a472f843cba9d3ae3216b4e92245b183a9583d62dbb0f4
-
SSDEEP
1536:1v52tQUmHN45cqqm/THFzb9kF9DQ1y6p1ujOo7ewAmN:1vWY+b/TH5b9eTOueYN
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
System.exe
-
pastebin_url
https://pastebin.com/raw/erNS5DCf
-
telegram
https://api.telegram.org/bot6322711372:AAGbIfXFhlNS1SFeiUdz8wnaxv2bCiayqnI/sendMessage?chat_id=1098594855
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ