Behavioral task
behavioral1
Sample
XRbx.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XRbx.exe
Resource
win10v2004-20240802-en
General
-
Target
XRbx.exe
-
Size
59KB
-
MD5
9a393cb282ebf275b205165e0170ed31
-
SHA1
090d9039884c1f3e8db88aa31375ad459802565d
-
SHA256
9fda3508360df0c069b2526f8c2f3ade8ce1a2b2a3455fc6af701f99c44288a1
-
SHA512
e9bbf1cb20c74fec1fc7bf4411fd42db1ed3ea925dcefe4f7a627c1f0d6cb0c1e1bd5d11aa508ac8895bf276259efef63243ab5fc93d9594f60cd2ff0f9977b7
-
SSDEEP
1536:Kw1NGlKbcTxKAkbKeEU078mPoXaOIkM7:KwD4TxDkbKeDMAqOIX7
Malware Config
Extracted
xworm
127.0.0.1:33986
looking-coat.gl.at.ply.gg:33986
-
Install_directory
%Userprofile%
-
install_file
RntClient.exe
-
telegram
https://api.telegram.org/bot7372223412:AAHo4ehv0V8rzGJPeWNqIxBlrYsHghLIdcM/sendMessage?chat_id=7388074186
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XRbx.exe
Files
-
XRbx.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ