Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20240802-en
General
-
Target
XClient.exe
-
Size
70KB
-
MD5
9d65197d7ba6cf1edf614e2ce04aecba
-
SHA1
77903dcb31858851195ff168fa3b2cfa02759bbe
-
SHA256
3a6d59dd63b43240edaca116151e670328c39fe0249ba21c416d407b0edc322b
-
SHA512
a409864c83807febc52c4d0a9cbd7a5c60d8a64540a96bb395f27ad6032fa53cdac9fa95d9f1d3853c9f53b130ba139287a8ff2654c1247ca4634e915e1db8cb
-
SSDEEP
1536:rY55OOI9+rEXeXv6Xn2RObzYTeG4P3z6wbVLTOfz5Nx:rs5OOrONbzYiVl9OfXx
Malware Config
Extracted
xworm
since-searching.gl.at.ply.gg:64197
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ