Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240611-en
General
-
Target
XClient.exe
-
Size
72KB
-
MD5
133e0cb67e34930d924d5908b89de2bd
-
SHA1
3158a7be5993a57776112b6b5a3e08967c879b73
-
SHA256
4c5ad50fccce8db3bedf93becd7807e618da31b9d1a276838d692ecdbd1ecd24
-
SHA512
b32e4fd400cf258ed13eddf2b5a709189f137f9be27b8644a024204d445dc42b6313c981499eb6f1656e27c4579f7f6a10f4d6de1942602f69670559979f9e81
-
SSDEEP
1536:OMOk0e143bxoihPmbJHoRgZyr96rOOki3DHhOeS:1Ok0fOJbNo6OOb3D8eS
Malware Config
Extracted
xworm
3.0
silver-bowl.gl.at.ply.gg:684
silver-bowl.gl.at.ply.gg:0684
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ