General
-
Target
XClient.exe
-
Size
329KB
-
MD5
51d7beb4236e50e6238389f7ede77227
-
SHA1
2cd6ef65f2af0d15764a94717af83d36512f3b2a
-
SHA256
5e83ca98a0a7200952afb3609975d0764d183090da422774f969e1b109b9b904
-
SHA512
2f060324a26dbabb37b9132defe703c65b00e4fc780844e58e1eff146971d09cfe8455479edd8e27c1f4bfb0ce8b0be6ffbc6042b6b5215970865b6269f15483
-
SSDEEP
6144:Yki6z0brsdgF+GIIIIIIIhIIIIIIIIIIIIIIIU:Y8z0si+
Malware Config
Extracted
xworm
127.0.0.1:1604
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource XClient.exe
Files
-
XClient.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ