Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20240508-en
General
-
Target
XClient.bat
-
Size
36KB
-
MD5
9b0ec63c76348957b6eec9d0cbb20a6b
-
SHA1
96d10e7bd9b9e946ed415596066250502b78f570
-
SHA256
caacc6fd0c872b2445fde0364008d8170368fd750febd139e0c37b537061d4aa
-
SHA512
8a96bc1bca0d18ae99ed2c0b05dbdfbd6530586251da6ae04bedaeb752760426f66a04a39141a2f0d0b26c6c5bdb616738dca42a1078ea3f64fe779c1c1caba6
-
SSDEEP
768:4MiqTmJ4S2BsbHh9Q3B7jeh/Fu9y9KOfh6/OK:IqAMWHhOx7je5Fu9yAOftK
Malware Config
Extracted
xworm
3.1
blood-sticker.gl.at.ply.gg:65461
z3S8eqN52LVAY2zb
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.bat
Files
-
XClient.bat.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ