Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10ltsc2021-20250207-en
General
-
Target
XClient.exe
-
Size
181KB
-
MD5
cc753ab1d8daac56d1e705e62d632537
-
SHA1
7950dc74519b207c3e24bbaa104df978a56872cb
-
SHA256
1578626a3dcfb7b8f1b45b8a4ae7dddb8a185a9f8b5078bde4b094a93da14097
-
SHA512
3dfc0e2d1ab6bf2dba387dc9fb1bb3cc1b61ff84ce0ace8569ad138121ef0a2abfdacfe4c96559b425bdda2b7c7ba7da7df0e618cc9f3a76a5ca4ca5179325f0
-
SSDEEP
1536:LkZLPk11vanHyaRxXT2Ug+bNoZ8Avnn6emGOEPgHEJtP8TNUPhoHEq:wVf3g+bNMvnRmGOEN18TN8IEq
Malware Config
Extracted
xworm
93.80.32.255:7000
-
Install_directory
%AppData%
-
install_file
system132.bind.exe
-
telegram
https://api.telegram.org/bot7603136465:AAFpLP6n-3zudeL31J79Iemu9BCZkFG8shw/sendMessage?chat_id=5177525105
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ