Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240215-en
General
-
Target
XClient.exe
-
Size
66KB
-
MD5
baedf150027f43b6390ac4340236b361
-
SHA1
a1a19d5acfd7eec11d933339fd007dd321a59eb0
-
SHA256
0fdf56048a015e85f39d8f76285b9f1bf67b5a78b9a88a93c0333002e3b9302d
-
SHA512
77099f7349d2a27dc0c62184a9d69c838472f861746a18e302d4d707cb1f2e31ac21b80cfac6dd51d3f563f71fdc3e0971163acb808415f02a40fdb1c44f1d0e
-
SSDEEP
1536:OgjI+AJaZH8D5uGffddS0bbLZAZ1AMGYrvu6mOfSf3V4IP:7I5uAbblATTr+OfSf3eIP
Malware Config
Extracted
xworm
https://pastebin.com/raw/CHvLBM9M:123456789
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
pastebin_url
https://pastebin.com/raw/CHvLBM9M
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ