Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20240802-en
General
-
Target
XClient.exe
-
Size
36KB
-
MD5
441e0733f2a0d2b4e56608e0c782362a
-
SHA1
e910b201ee53276798b6d19141ada0dd407b61b8
-
SHA256
1a0cb0bde4305854bc19162b7a7173ebd8852630404fc6c3d00b9bab48c0544c
-
SHA512
47b06d81e804d69e97187459f89275e8d63a87b8a744e337387d3ed6a7bbad14c7f9bd0fb315fe0aa9f27686d46d50be2ab8eabb2f9334a0ecae51d3b7cf1a02
-
SSDEEP
768:aFL+VcP6pUIThlWaFF6iuRQnYe4o+5B5Fyc9l86rO/hz0x1:ad+zpUIH+iuRQnY1oyF39l86rO/a1
Malware Config
Extracted
xworm
5.0
outdoor-tu.gl.at.ply.gg:8848
3NKxrUKddNSGLTde
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ