Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20240508-en
General
-
Target
XClient.exe
-
Size
72KB
-
MD5
dab9e10b713779e5a811a1c89ae6252a
-
SHA1
fea8c8140c6b13fabdb258acb3a646c1a54e36be
-
SHA256
e712b1e3a9313d86fce1ca310401f88e8fcda3c2b65ff9633613018bac09012f
-
SHA512
ad6f6b0a0b1ce606964e1fa1ddd3ccef30fa2f90b1af3e57108b7a30aeb43aa02e64b407b519e1463597f4147f639eb1d09d4c0717127da8700d2998929b03fe
-
SSDEEP
1536:XdqJfIiYkjEj1xFhI6mX1EgjbDhcb6rOFw2Uy:SlYJBjXkNjbDXOFwHy
Malware Config
Extracted
xworm
isbn-employee.gl.at.ply.gg:4328
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ