Behavioral task
behavioral1
Sample
xthingy.exe
Resource
win11-20240412-en
General
-
Target
xthingy.exe
-
Size
98KB
-
MD5
292179f4a1d3d97ef682df917ab28fa5
-
SHA1
d966e4ae7cda2c53f283ee1f097243bded6fabc3
-
SHA256
48db21982e3b50f4690818e958b0d831c3098df6a229b88bd09776087de6a56c
-
SHA512
5d6f2253232f509134573758c6f7dd401e0361cf6270810704e513bdfa8ef21113dc7dce3506600e549e35bd3b8505f31e536a9d69c48f308c3cb449d7fc4b89
-
SSDEEP
3072:PdFrB+e9+wAf/mNbkn5VO1ia/ZOGLdmgEA6IIF:PnFtPK/sbknrMdIA
Malware Config
Extracted
xworm
88.202.231.139:4444
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource xthingy.exe
Files
-
xthingy.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ