General
-
Target
XClient.exe
-
Size
32KB
-
MD5
9bbb4cda8efb91e35a8c096ef3ece712
-
SHA1
995b18051de93508cb53cb6d4fa4dc57ffc16e0e
-
SHA256
0d13d6845b064b82e1c87d3627d51802455917c0ebb291249831dc4c780f507d
-
SHA512
2b3bf921f3748ebc85f48c271827ed4613c90700d494f57e4a0df9aa5dc2799c889f61369588bf868846287401e45aa25cccdb39678e6bc26696ceb99d8b99c9
-
SSDEEP
768:UVa+vNtg+PB93Tw4xKdVFE9jI4Ojhcb4:GvNtgw93U4xcFE9jBOjmk
Malware Config
Extracted
xworm
5.0
19.ip.gl.ply.gg:44123
BUVOCFMELlHLKGdO
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ