Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20240508-en
General
-
Target
XClient.exe
-
Size
77KB
-
MD5
d48c93ab22571854620800bd29ee9e54
-
SHA1
74463fc68f3643153abbcf10f555f459d1a3400b
-
SHA256
fad7f858e34c269cddf27a915f2bd613697c9602dc639e6885f8e8379c61eb3c
-
SHA512
822a0342114ffee47c57b2e746359763e2f211b0b26be46694bf7351be6993460abc939c43bd567ca14d462dc992d21310439703de29d092b82d50830bb43620
-
SSDEEP
1536:22kpUOApqavqQSqssTq1ex64bQgjA99Ty+bDIh8bEtTT66Ga7EtOXQNEh7Bn60:F4UCZH51ex64bQgj29W+bDIWbEtdl7E4
Malware Config
Extracted
xworm
primary-region.gl.at.ply.gg:65203
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ