Behavioral task
behavioral1
Sample
XClient (2).exe
Resource
win7-20240704-en
General
-
Target
XClient (2).exe
-
Size
37KB
-
MD5
d3f84f5f29fa6dac29b72a52f72e2dd3
-
SHA1
a0c4cc783d6ca49583983bbb1417e6adbf25b79b
-
SHA256
7f39eeacfb83aff9ea80ad8a205f36bbce7361cfab4f973b2a122103e49ff2f2
-
SHA512
973d87715d2b1541cb20b3c988a38432555480b5a7998943d320d71c7f676ef7bdd73849532376d922acd38192b8a6589fb13e2b6af13b66301619ca1e294bcf
-
SSDEEP
384:iLlqiAFQMU3qe+tt2uPr7mSwy+Mo4LZ6XKyNqldy6yvUl8q7y8/rXpkF0+LT7ZwJ:ozr3q7RnThygEgL7yg+FC9gdO1hMFQ
Malware Config
Extracted
xworm
5.0
mart123-63003.portmap.host:63003
92NnfrzaRNPPSQq5
-
Install_directory
%AppData%
-
install_file
Java Update Scheduler.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient (2).exe
Files
-
XClient (2).exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ