Behavioral task
behavioral1
Sample
XClientRAW.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XClientRAW.exe
Resource
win10v2004-20241007-en
General
-
Target
XClientRAW.exe
-
Size
75KB
-
MD5
8901222e32955d6a0b3726cd5df36d7d
-
SHA1
b7bc55849ec918a7cc2b3d95c1f3bcbeef3bd940
-
SHA256
93499d87ab6ac4928d012b452b28433064cd554a5b11f74a615811def521b8aa
-
SHA512
152a18e989ef822f65631eb273deabc19affcc377aa64e18cec51ca1e6869e940c003534deb7b047e22e7d43e9993b295ff229255d6a28ed2ac514a31f36cf7c
-
SSDEEP
1536:RM5at9jdDNbjPXtbgoG0anpMaf6/wQ1wO/MxK/6:RMyHp1bgR01OawO/Mo6
Malware Config
Extracted
xworm
-
Install_directory
%Temp%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7414557379:AAHJMIrSP_hoR0jelLf8igel3SZxGY860qU/sendMessage?chat_id=2076906822
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClientRAW.exe
Files
-
XClientRAW.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ