General
-
Target
XClientuse.exe
-
Size
73KB
-
MD5
4b17ff47684e57277243fda4fa08bf89
-
SHA1
3dca80b6512165841863b70887439e6b20b1d9b9
-
SHA256
c320cac849241ae21054aade63d1bbf03e23e290e50404d7472c404c37d7cd20
-
SHA512
7f07596d3d2aea69bfdc1eb4fa7caa5c83ca8a18fb8d0d15ed301bbc6285c7953c44e90fc578f9bb7bb277948abaf5bfc32b63ebb07a1aba054e15f1ee5750a8
-
SSDEEP
1536:qfM537zQ/MXSiIO59huniebHw5we+22LZ6VvvOuKWKx:N33r5ziBbHw5wQvvOuKVx
Malware Config
Extracted
xworm
keep-motors.gl.at.ply.gg:2646
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClientuse.exe
Files
-
XClientuse.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ