Behavioral task
behavioral1
Sample
XClient.exe
Resource
win11-20240709-en
General
-
Target
XClient (1).rar
-
Size
70KB
-
MD5
1b2db541c92ee3307ab14d047f9dbf8d
-
SHA1
f143954c0b2365661b1d7b913cd86a94469cbc38
-
SHA256
2da51e4fd472b9883d12a555b55ffc11e551301bd792548279748e259ddf7a49
-
SHA512
1ef3bfb88df7df4fd096084acaecc94da13410e85f223c1a87ae52a4a1aa7f210f8744f5b6534308be8655a97956bcc4855092d7d38bd14d8d15d2f7154c626b
-
SSDEEP
1536:0v5h0Jbb2MyLMl2pYIAJdc5E1ZHEDJ6k2Aw66t1CGtWGtHZ/XAZRW:m0BJyLMl23AJNkDJ6k2AZ6tAwHZz
Malware Config
Extracted
xworm
127.0.0.1:7000
81.98.102.72:7000
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule static1/unpack001/XClient.exe family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/XClient.exe
Files
-
XClient (1).rar.rar
Password: 123
-
XClient.exe.exe windows:4 windows x86 arch:x86
Password: 123
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ