General
-
Target
hhhhhhzzzzz.exe
-
Size
68KB
-
MD5
15c61f17a9f32f04d3a24f4c27892ae9
-
SHA1
3b0c1009535cfc54196e6385b33dd8cd2d61a0e3
-
SHA256
fba1e716792a6b04510ad57cf7779c529b33e6cb38d0aebe4fbe1115f5c34ac1
-
SHA512
7d30909135a10d1d377e8fe4413aa7dab754172992248e6a8136c57f10e4584e0948d34ab2527d4f7ebd77c8abcb8ad65b8b5caff01e333101ffa3131376f04e
-
SSDEEP
1536:MpgW2KOlgcL16BvQmPcc3hbgwVy6KOE64PwAkOWeP6z+4Vk0:ygWZGV6umEcxbjxaPmO0zji0
Malware Config
Extracted
xworm
battery-irc.gl.at.ply.gg:4156
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource hhhhhhzzzzz.exe
Files
-
hhhhhhzzzzz.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ