General
-
Target
XClient.exe
-
Size
32KB
-
MD5
9aca5a54c27181d3d74510816c866eb9
-
SHA1
818b04e7614ca72b59317f24ffd84e7b4c0075f8
-
SHA256
913b54c5318895e04071a24d25bb394859007e5f6df6c60753433e35d4bf49bb
-
SHA512
329aafbd6019896b26d53b3f5965dabb9d8e89f0d78215704b647cb18d040a48c7192c0fc88abf83f8b47b437ba54fef2a7ed6e0285b64d2a36a482a4e871725
-
SSDEEP
384:UlRmhGD91SluSWhnHHxzLmYV3Tm2eaFOzldRApkFTBLTsOZwpGd2v99IkuisRCVR:gRPD9OQhx/BV3Tw4OldVFE9jhOjhcb9
Malware Config
Extracted
xworm
5.0
127.0.0.1:45515
20.ip.gl.ply.gg:45515
REskz5rzWxFp3MFy
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
Password: Xxx9
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ