Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20240508-en
General
-
Target
XClient.exe
-
Size
34KB
-
MD5
21fb8644089db75214b6a10961b7997e
-
SHA1
4b98638053b4fee1813ec52576d2722902400627
-
SHA256
4fa9980cc7ac04bd3cbf788b74c46ca476264fab83bca4bf47eecca1b495df08
-
SHA512
58da25a07737c29109ebf1969f305480606dde21a25115c01a85ab0f156f10af980f1a83d65af96e8f192006bc8072396c4eacef7e910729908215a6b8681091
-
SSDEEP
768:OCRTbSQsoIv+QSkNTcCZ/5G3rFWPk9g9GO9hGRm0s:pVbqoAnbNYCZ8bFD9g9GO9IwF
Malware Config
Extracted
xworm
3.0
ayumi-27013.portmap.host:27013
zU8QcaNseDq9eQWJ
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ