Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240221-en
General
-
Target
XClient.exe
-
Size
70KB
-
MD5
d5dd5984a76d75a94504837d8bf1f411
-
SHA1
990ec7796b41ba75020d5c3bd7742bf47885b5b9
-
SHA256
c6bd7dea1a83df5845e35c9e2cc282d7156ae80935a40484cbfe99f5b2f8660d
-
SHA512
191915a588e8436213b71cf32c91cad99398ef0917967eebb09f66c5ffad2b5640924eefd8d0a5b88777f058b666504c7fcc93ceb3d0ccbee1c531fbe2ab776e
-
SSDEEP
1536:PvXKPZJROtF0dtPs9Ldm+bQwdoImM6NO8jg6QtmE:KBEN9hm+bQZvO8jg6Q4E
Malware Config
Extracted
xworm
127.0.0.1:44573
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ