General
-
Target
XClient.exe
-
Size
51KB
-
MD5
2787d9e8a64842885ebd6550255c6202
-
SHA1
c7f33c3d403b424dc391a461d2c7a905314d4812
-
SHA256
e6723248680578bc5be79251443739e1c7fac8ba1e5001a8341c77e3ffa6b2bc
-
SHA512
63f22df446e975bdf19e9dfad802a72516b869f75842fa1a1e6c6575c595589d9e65d3dfe5ce41d9bf70566cf8b2fda87762da160a1e684b96f5ce425b049504
-
SSDEEP
1536:JHpyf3bFAkbN8tGgQLlvz8jLZplO7t3J6K33:JQjCkbCt7c8LZplO7tZJ
Malware Config
Extracted
xworm
127.0.0.1:80
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ