Behavioral task
behavioral1
Sample
XClient4.exe
Resource
win7-20241010-en
General
-
Target
XClient4.exe
-
Size
33KB
-
MD5
7ce0316f7dc2e0d59f7274bdc18aa566
-
SHA1
3e8bae2ebcb5ba258634f5e31e6479ac31760147
-
SHA256
8a64168a70be9147486da40573ecb300a8427c019b82169c58eae4b3e0d94ac7
-
SHA512
d933b193c14986067c5ff30a8bd41c702f849afffe755398064bf88e162121f042da2e78ecf4acbf7e6a5de86ac1271bc612db8c4cbc6f5b4efc26153363a531
-
SSDEEP
768:+4fK1pDGkptwyZScCBSUapNgqlDU/fZl+BcgN7AlTF59iBO9hHS8Rf:ODGkptwyZScCkU4rNUXZcB5N7QF59iB6
Malware Config
Extracted
xworm
3.1
celex-35359.portmap.host:35359
7GxIsOHgvkeBSkzn
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient4.exe
Files
-
XClient4.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ