General
-
Target
XClient.exe
-
Size
45KB
-
MD5
50c438b17ea8abb02223e85439ac540a
-
SHA1
2aede071e7e828b66a1abf8276c5b014c4e11969
-
SHA256
4f738c73584f1139d033711e3e3e6000ab667d4d4cb2c654f42c475b2e3755f2
-
SHA512
afbedd5fed88af6d9ac8ae36f162fa5eb6a02b1f98218f3cc7c122a9967487cf03bc87ba236afb4861755362f1a0459ab057f623dcbb6d213700781887c9921b
-
SSDEEP
768:7U0MGoOQ862I0BXMqpgbgBT4lGAmFEPG9nPn6vOChAz9is5:7U0MzR8QWf4kF19Pn6vOCuAs5
Malware Config
Extracted
xworm
5.0
xRYxJYpXy8YPuTlc
-
Install_directory
%Temp%
-
install_file
Registry.exe
-
pastebin_url
https://pastebin.com/raw/fqZCUyFU
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ