Behavioral task
behavioral1
Sample
XCl2ient.exe
Resource
win7-20241023-en
General
-
Target
XCl2ient.exe
-
Size
34KB
-
MD5
e3153daca458310a1ba841e0963bfbd8
-
SHA1
0b6ff16b7319585e219c6827af59bbeee72d49aa
-
SHA256
79dfbbf59c2491e7f41cce29ede9ed8ef1f72a09ecadc7c7b7d1fb2f9f0c18de
-
SHA512
8c01dd2178b3bc78a1497b82f082ca25039a3d2271df016f6f816f47f07fce9a5d0ed8dbce4493b7d8dd4a147cb3a466cf76b56d8f03eaa3e78e48a2345484b0
-
SSDEEP
768:1XB2GxebHGDyC3/VFye9FAIOjhEy6ErL:1XB2MAGD3NFb9F3OjqqL
Malware Config
Extracted
xworm
5.0
travel-sellers.gl.at.ply.gg:48966
qPW9CsexGbHjmaIU
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XCl2ient.exe
Files
-
XCl2ient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ