Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240704-en
General
-
Target
XClient.exe
-
Size
255KB
-
MD5
33927a48d1181eba4a4622fcbc4f49c2
-
SHA1
b2122854cc6a69b10d1b855d1c025bb0c0d8db9d
-
SHA256
da48d66dd7f8534f28c38df951b0979078e99409ba08ae84adca7d16c42ddebc
-
SHA512
d37930d2f13738fe10568f6edcb62bfffc024a07d834e3cd5d34f68f27618d89ff078ba68195ecb0819f4e441d3778a59005c35d66e0ad3cf56c577e8470ae5e
-
SSDEEP
6144:ZlyLyb9oZ8+T6yzRVd3up9SRBU7s1HQEf7AOi/Opuu1E0YaHO5:qn8+TtzRIEEOu
Malware Config
Extracted
xworm
custom-authentication.gl.at.ply.gg:50023
-
Install_directory
%AppData%
-
install_file
BetterRoblox.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ