Behavioral task
behavioral1
Sample
XClient1.exe
Resource
win7-20240705-en
General
-
Target
XClient1.exe
-
Size
35KB
-
MD5
9bca554d14108cbe78a8134212b162e6
-
SHA1
ec628ddfc8a4e9193ac7dfd222a1293ea0c2fcec
-
SHA256
2b971630f232410be22f953fa16b9ea628d46717ffc1955f463a8a01be1b4b68
-
SHA512
939c24e5913b4b373833a3b13cf2a0cfc14a1384b049da1d9eab5fe87fcf8a316b705266cfbe2eecf070a9a794bfa47d5c4d5c61f9463b16eed5e0213ec232e9
-
SSDEEP
768:xOrX+c360pZukg+4s/hxWFyz9FaJOjhbkME:xoTXEu40mFC9FaJOj3E
Malware Config
Extracted
xworm
5.0
mGRuR1IP4Am3FtcE
-
Install_directory
%AppData%
-
install_file
Roblox.exe
-
pastebin_url
https://pastebin.com/raw/HjP4D6Hg
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient1.exe
Files
-
XClient1.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ