Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240419-en
General
-
Target
XClient.exe
-
Size
33KB
-
MD5
5c7f9d7e424e55486da45c0496766c0d
-
SHA1
94798eaa3b48bc221d633e9b14670f954dc9e6a1
-
SHA256
5c7f2a41c842baab25b83b20bbec00f3d4fcd7489c5a74c0e7cf866334711a54
-
SHA512
35aae931410c53e02dfcdb9919643487b0a4af219f23cd60b53e2ea1f806d98916cd1cb556401cc396ef142c1d4ce0e4c333203d05541b6e321cccfd5b0da491
-
SSDEEP
384:f+i/Uua+vNijn/xVnzc6nLj7x3ZFsLcvSAOo5DRApkFTBLTsOZwpGN2v99IkuisX:na+vNkDpXx3HJvl1DVF89jaOjhpby
Malware Config
Extracted
xworm
5.0
109.125.129.2:7118
c3X97UGU45i1bmvz
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ