Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240215-en
General
-
Target
XClient.exe
-
Size
69KB
-
MD5
83479ef0a57ba7fe7e994e4c6e5801ce
-
SHA1
93826d2f4a794a73c0ea9a2ff746becea5a32024
-
SHA256
ab1524dd1797e3ca240b19261f3b6c96e22c9aae55652433f7586bd8a650396d
-
SHA512
bace043a00f1d459a6d19e18854ab0dadf4677fb6f8d1adca8e1f85a054046285ef7f94910a88f2e383f86ca9cb7a2e2522ff85fcdc5a38eed7784bd2db54092
-
SSDEEP
1536:LccMYH9VP/8JT9WBftubjrc2Xgh61oNeOtxMNuTrguDf:L3LP0WCbj/XJAeOkNurTf
Malware Config
Extracted
xworm
AmirAmir8565-56372.portmap.io:56372
AmirAmir8565-56372.portmap.io:56372:56372
127.0.0.1:56372
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ