Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20240709-en
General
-
Target
XClient.exe
-
Size
40KB
-
MD5
d8a58f155d2e4f3dd34e36f407923ca3
-
SHA1
5b72578fd9b9e2d1778c88b838b6a43fc9f7faa2
-
SHA256
2896a88e5c5b3e6be1f9c89aa69bd9e409cbd21a9eef36d381277ca4bfa88fce
-
SHA512
17557d9117ae99840c5c83b3e047b95d0f969b22b8af45bf8b3a6cc04994336533ab66d29dd699cf6cacc16f55e5c77b3e10e5fc077ece60f761b726bf03e913
-
SSDEEP
768:a1FTNqOweif3OC2TMdvZJUJKmVkk522nXoLFRP19/ENOQhddPZ2N:CFRqOwff3OtTMJZJUJKmV3g2uFH9/EN2
Malware Config
Extracted
xworm
3.1
girl-tries.gl.at.ply.gg:7131
2GZHD2vYPnN784m7
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ