Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240708-en
General
-
Target
XClient.exe
-
Size
71KB
-
MD5
c714ce116161ffa8fe2ffc7ee408f713
-
SHA1
1b0819d6f5e3dd40373e53ad682f07b8aa19245a
-
SHA256
1c67718222ae0d3f40781776f8905d56a918ffa47df677981bf6bd8a678816e2
-
SHA512
f4d9e87f102cc300d2454148cb515786844f770cfb4054a62c057d091f1e461c4f2840b76938dd5fda370103b951971565fbc9ce1177ebed9a2661a1e0636385
-
SSDEEP
1536:q3jU+WqYYbcd5QBLknayL3jk0W4b1xLRJ2/6EdNz6OD7+y:qw+13cd0InRTDb1hAd8ODKy
Malware Config
Extracted
xworm
keep-motors.gl.at.ply.gg:2646
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ