Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20240508-en
General
-
Target
XClient.exe
-
Size
36KB
-
MD5
19822e23c9acdca43e50e979515396e1
-
SHA1
26fcc747d58f852dda89b12175d84ef03ff08e0f
-
SHA256
08374f7369c61f5c019aa49e63b65018ae8b7373ccc5ea723cfb4b85f6e33579
-
SHA512
791d818562a0e68fe688b77611f250a807cfd2b76c41f81c51248471b33c2e9e9010fca28f0d36b5587e537a4adb31108a2de4d1c8c8e91bb8a28e34a830e8fb
-
SSDEEP
768:LMiqTmJ4S2BsbHh9Q3B7DQX/Fu9ybOfh+7Of:TqAMWHhOx7DQvFu9ybOf5f
Malware Config
Extracted
xworm
3.1
k-infectious.gl.at.ply.gg:9165
FpVo0eVgX6mPYpjM
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ