General
-
Target
XClient.exe
-
Size
66KB
-
MD5
bbff181060e31ee112d32ef5a5cb1648
-
SHA1
59d69499132ed3f07569e10e8685431206bbe685
-
SHA256
1ab506bce83eb3b12674542c3fd1429805e4b5a1ae3aff6fe60bbe0888b68f94
-
SHA512
4a49720b9fc2bdf47c009103a8ab0a1458c9c39a1cda0753fd0bd1d957311d996b43aa4765b12bd60c3185f3ff291fa514743c42b7ebe7a63dfe606f61227ffc
-
SSDEEP
1536:7vhvEbWkP+pI+vrcP/aovb5tHJH6fROSBB57:7aZMI+vrq/vvb5DMROSBB57
Malware Config
Extracted
xworm
31.208.113.236:8080
147.185.221.16:8080
127.0.0.1:8080
-
Install_directory
%AppData%
-
install_file
test61.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ