Behavioral task
behavioral1
Sample
c56bfa4afd61f5fc95cb0c3b2dce23bd2a2c2656ab2df09fc98e584ebbe6a00e.exe
Resource
win7-20241010-en
General
-
Target
c56bfa4afd61f5fc95cb0c3b2dce23bd2a2c2656ab2df09fc98e584ebbe6a00e
-
Size
45KB
-
MD5
dc3ad389d4ba11ef04240077f239d4ce
-
SHA1
ca1c017c859423c849d15da10ba9491319706f83
-
SHA256
c56bfa4afd61f5fc95cb0c3b2dce23bd2a2c2656ab2df09fc98e584ebbe6a00e
-
SHA512
3ef092a17f0a11a56c3a959a3fb875ff37b7e266b09e6f2542d174204169ed0e3802b268a753dd2a11dee4d3331fe3e0ba38b9d343951591db167039d3e5e9b1
-
SSDEEP
768:IurlDweV3OOVbADM9W1v9NfgkBpuAuREcNcFhlVvD4xeVhKfk/LbFEPa9pvg6iO1:IADweQKADMkV9GkSAcRaPlZrOc/FJ9Nf
Malware Config
Extracted
xworm
5.0
127.0.0.1:33779
23.ip.gl.ply.gg:33779
QXJjAl0pyGprRcPi
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c56bfa4afd61f5fc95cb0c3b2dce23bd2a2c2656ab2df09fc98e584ebbe6a00e
Files
-
c56bfa4afd61f5fc95cb0c3b2dce23bd2a2c2656ab2df09fc98e584ebbe6a00e.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ