Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20231215-en
General
-
Target
XClient.exe
-
Size
71KB
-
MD5
29c205a134b25358d7e42b20699de11c
-
SHA1
2332f7f57723f44cd95fded17b6e006bc39b7bd4
-
SHA256
af48082157761bfbefc93342f033af42d3c22e6c8be580cf9c1c9100fe91e744
-
SHA512
74ea9b7ca48165c369383c91f2aef516d1614dd6ba118c55dabb17d9f642d97a6845446ac62e5937e122085253693fc9a9033dc91009caa268f5dcced5c5c7ac
-
SSDEEP
768:RtAwFBQxVtVUsVQsnNuLFW2IyJ0vLKEfEb7gD2JSaGy+1QI6ydOIHwh/deRZ9Ai:XyxfdiCNT00eb0D6OyHI6ydOmwBIDGi
Malware Config
Extracted
xworm
127.0.0.1:1244
192.168.1.15:1244
-
Install_directory
%Temp%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ