General
-
Target
XClient.exe
-
Size
33KB
-
MD5
33081cfb31f7e29654099d9569ee53b1
-
SHA1
fccf89fb8b1ab16a7e9132b65ea413d608f80a0a
-
SHA256
06c3272ba85c845b09075e1bb03de99667dbe3ddc8ca6c9aecc6a81cc405b782
-
SHA512
8689f476003b510f49bce7066f54c84752fa3c09ec5d94e57876dba92eeb3c70b78d7b97e1bf6baccf31ba22b2d1a4da6afe814ffd6af6bc0ddbac36bad1130f
-
SSDEEP
384:7fP/SG1aTTcPTEUV75LC2SM42pfL3iB7OxVqWqKRApkFXBLTsOZwpGN2v99Ikui1:711weF3X42JiB70lVF49jSOjhAb0p
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
front-applications.gl.at.ply.gg:7000
7LuKbjLL15rcFt9q
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ