General
-
Target
XClient.exe
-
Size
70KB
-
MD5
9ea3680c9a32e274b5dbc01bdf4e5d6d
-
SHA1
ceab73d240bd2dbf46616b9fb2ea48052f0c861e
-
SHA256
155a45a348f309ce05b7944c0a4d9e333d482b71c3b7b8ec21f18875149e4c9a
-
SHA512
b57a9c24f539cf7a849640fe053a5494feb962bb65ae2f0972859b52ef4c7e8801c092e0526460c00ebf69228877c60747098e3f8d912a7eb8564cdadfa734b1
-
SSDEEP
1536:1EAE/0/f/wwNK6vLgb3P6uxKYDPb6CDecAOqxId7:OANwI9Tgb3P6/YD/DTAOqa7
Malware Config
Extracted
xworm
keep-motors.gl.at.ply.gg:2646
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ