Behavioral task
behavioral1
Sample
XClient.exe
Resource
win11-20240709-en
General
-
Target
XClient.exe
-
Size
151KB
-
MD5
de4969d128c7c78563ab99f1688f6def
-
SHA1
88e2710df6de90546db25cff2cd78e27024abf9c
-
SHA256
f1456c06ee9a8a4f9180bda0abd4a3dbb2dfe23dea01b0ca9b293b86e9c097d9
-
SHA512
35ec2641fe2b22e00a3fb4e299d37028bd2628466a72d14a414b21f848c9e56c669bcfb652672f160cfc09ac2ad9098f41fd3178375d2a7433a9cc274f21a0ca
-
SSDEEP
3072:cXii9Q2Kf2lu3b+xSbLtOsUBsVlWN97u9bK6Sz0cAMSCboTiF:N+Ob6SbL0Be9G6DMz
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
\Roaming\Microsoft\Internet Explorer\UserData\iexpl.exe
-
pastebin_url
https://pastebin.com/raw/ChxziS5b
-
telegram
https://api.telegram.org/bot6809718735:AAE4t3xfzBHvyjC4zipUDbw1pc62fwQYOgs/sendMessage?chat_id=6601299789
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ