Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20240709-en
General
-
Target
XClient.exe
-
Size
59KB
-
MD5
f9dd8e278b51af802ce58660d89ba9c2
-
SHA1
6bd1758791a923a77bae6345b6f3ecf20b40da6f
-
SHA256
e7363e166d7497fd33b77ce522222ff1c3be313cc201dd4102768726307457a2
-
SHA512
486da266f4444a9c081493ecaf1f79780734b88098788d7a444d6a3fcdc2f5f3f0fbb8d3c2f629a9864d6d302f76d8a5a9b6d6973ceae94d6f52d226002796ff
-
SSDEEP
1536:TgaDrjHsVRyLaCJC4wbvmelB8HcO+PxWvxEn:Tjrrs/ymCU4wbvPBBO+WW
Malware Config
Extracted
xworm
step-trash.gl.at.ply.gg:2200
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ