Behavioral task
behavioral1
Sample
XClient.exe
Resource
win11-20241007-en
General
-
Target
XClient.exe
-
Size
71KB
-
MD5
4eee730e3f4cd1e6b1f2455dbf51f5b7
-
SHA1
c95911de37debd2e3df1c630ddeeac4968413296
-
SHA256
5e0fbebfe54253ec36ca1b69bb380e2568de6fb650185438068b77212ad6d23e
-
SHA512
7caf0d07acc752c16c29d77c4ae0c67163367435ec7fe6109ed1561f4c2320c9a54449e911d48d627606c822108fbe48b4193201adee5137015837359e1768f4
-
SSDEEP
1536:eV/fyQp7uAxurpTNgbRaKgjtqK6B64iS5O2x571t:eV/d7hot2bYDDlS5O2x3t
Malware Config
Extracted
xworm
147.185.221.23:38042
-
Install_directory
%AppData%
-
install_file
SystemUser32.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ