Edit tour

Windows Analysis Report
XClient.exe

Overview

General Information

Sample Name:XClient.exe
Analysis ID:869012
MD5:25a16f364fa103d6d2ab254065bfe2d2
SHA1:1759fb535c7514d063d12e3687856507d7ec9bc7
SHA256:2698fb5c3c46ef781958f43e418e2a193b97b3d09900678650ba2190c1cea15e
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Yara detected XWorm
Multi AV Scanner detection for domain / URL
Yara detected Generic Downloader
.NET source code contains method to dynamically call methods (often used by packers)
Contains functionality to capture screen (.Net source)
C2 URLs / IPs found in malware configuration
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
May check the online IP address of the machine
.NET source code contains potential unpacker
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Sample file is different than original file name gathered from version info
Checks if the current process is being debugged
Detected potential crypto function
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Enables debug privileges

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • XClient.exe (PID: 7016 cmdline: C:\Users\user\Desktop\XClient.exe MD5: 25A16F364FA103D6D2AB254065BFE2D2)
  • cleanup
{
  "C2 url": "even-house.at.ply.gg",
  "Port": "40766",
  "Aes key": "<123456789>",
  "Install file": "USB.exe"
}
SourceRuleDescriptionAuthorStrings
XClient.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    XClient.exeJoeSecurity_XWormYara detected XWormJoe Security
      XClient.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xc678:$s6: VirtualBox
      • 0xc5d6:$s8: Win32_ComputerSystem
      • 0xdf7c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xe019:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0xe12e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xd328:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.386459266.00000000008B2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000000.00000000.386459266.00000000008B2000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0xc478:$s6: VirtualBox
        • 0xc3d6:$s8: Win32_ComputerSystem
        • 0xdd7c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0xde19:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0xdf2e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0xd128:$cnc4: POST / HTTP/1.1
        Process Memory Space: XClient.exe PID: 7016JoeSecurity_XWormYara detected XWormJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.XClient.exe.8b0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            0.0.XClient.exe.8b0000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
              0.0.XClient.exe.8b0000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
              • 0xc678:$s6: VirtualBox
              • 0xc5d6:$s8: Win32_ComputerSystem
              • 0xdf7c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
              • 0xe019:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
              • 0xe12e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
              • 0xd328:$cnc4: POST / HTTP/1.1
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: XClient.exeAvira: detected
              Source: 00000000.00000002.654685537.0000000002AE1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": "even-house.at.ply.gg", "Port": "40766", "Aes key": "<123456789>", "Install file": "USB.exe"}
              Source: XClient.exeReversingLabs: Detection: 75%
              Source: XClient.exeVirustotal: Detection: 74%Perma Link
              Source: even-house.at.ply.ggAvira URL Cloud: Label: malware
              Source: even-house.at.ply.ggVirustotal: Detection: 7%Perma Link
              Source: XClient.exeJoe Sandbox ML: detected
              Source: XClient.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: XClient.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: Yara matchFile source: XClient.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.XClient.exe.8b0000.0.unpack, type: UNPACKEDPE
              Source: Malware configuration extractorURLs: even-house.at.ply.gg
              Source: C:\Users\user\Desktop\XClient.exeDNS query: name: ip-api.com
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
              Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
              Source: XClient.exe, 00000000.00000002.654685537.0000000002B75000.00000004.00000800.00020000.00000000.sdmp, XClient.exe, 00000000.00000002.654685537.0000000002B8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
              Source: XClient.exeString found in binary or memory: http://ip-api.com/line/?fields=hosting
              Source: XClient.exe, 00000000.00000002.654685537.0000000002B75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.comx
              Source: XClient.exe, 00000000.00000002.654685537.0000000002B75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: unknownDNS traffic detected: queries for: ip-api.com
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: XClient.exe, Stub/NIXf95cIBYqgFME2GO1bZlllR9tFwl3y7Oa.cs.Net Code: xbYU61LaTe5gz6268VCTlrizEDql9NK37HA
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/NIXf95cIBYqgFME2GO1bZlllR9tFwl3y7Oa.cs.Net Code: xbYU61LaTe5gz6268VCTlrizEDql9NK37HA

              System Summary

              barindex
              Source: XClient.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.0.XClient.exe.8b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000000.00000000.386459266.00000000008B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: XClient.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: XClient.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.0.XClient.exe.8b0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000000.00000000.386459266.00000000008B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: XClient.exe, 00000000.00000002.654495766.0000000000ECC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs XClient.exe
              Source: C:\Users\user\Desktop\XClient.exeCode function: 0_2_00007FF9A58810A90_2_00007FF9A58810A9
              Source: C:\Users\user\Desktop\XClient.exeCode function: 0_2_00007FF9A58868C20_2_00007FF9A58868C2
              Source: C:\Users\user\Desktop\XClient.exeCode function: 0_2_00007FF9A58857060_2_00007FF9A5885706
              Source: C:\Users\user\Desktop\XClient.exeCode function: 0_2_00007FF9A5880CAA0_2_00007FF9A5880CAA
              Source: C:\Users\user\Desktop\XClient.exeCode function: 0_2_00007FF9A5881B2D0_2_00007FF9A5881B2D
              Source: XClient.exeReversingLabs: Detection: 75%
              Source: XClient.exeVirustotal: Detection: 74%
              Source: XClient.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\XClient.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: XClient.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\XClient.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\XClient.exeMutant created: \Sessions\1\BaseNamedObjects\A5zb16WZlfeMzH1q
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@1/1
              Source: XClient.exe, Stub/dS3nyInUjs5Mefmh5pPjW60W1Q6ra8DwnF2.csCryptographic APIs: 'TransformFinalBlock'
              Source: XClient.exe, Stub/dS3nyInUjs5Mefmh5pPjW60W1Q6ra8DwnF2.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: XClient.exe, Stub/u0030ibt14tLvxNqcXE4Rf0eGzCUCJlLBoXPUk0.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/dS3nyInUjs5Mefmh5pPjW60W1Q6ra8DwnF2.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/dS3nyInUjs5Mefmh5pPjW60W1Q6ra8DwnF2.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/u0030ibt14tLvxNqcXE4Rf0eGzCUCJlLBoXPUk0.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: C:\Users\user\Desktop\XClient.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: XClient.exe, Stub/s0U1pZ3hU3f0Al0ZIek8eywCcryNFUX61nR.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
              Source: XClient.exe, Stub/s0U1pZ3hU3f0Al0ZIek8eywCcryNFUX61nR.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/s0U1pZ3hU3f0Al0ZIek8eywCcryNFUX61nR.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/s0U1pZ3hU3f0Al0ZIek8eywCcryNFUX61nR.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: C:\Users\user\Desktop\XClient.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: XClient.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: XClient.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: XClient.exe, Stub/NIXf95cIBYqgFME2GO1bZlllR9tFwl3y7Oa.cs.Net Code: NewLateBinding.LateCall(V_1, null, "Invoke", V_8, null, null, null, true)
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/NIXf95cIBYqgFME2GO1bZlllR9tFwl3y7Oa.cs.Net Code: NewLateBinding.LateCall(V_1, null, "Invoke", V_8, null, null, null, true)
              Source: XClient.exe, Stub/NIXf95cIBYqgFME2GO1bZlllR9tFwl3y7Oa.cs.Net Code: nMNfgL0rwqXMNDiB4b1Q51efTU8eaqW7VOv System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: XClient.exe, Stub/NIXf95cIBYqgFME2GO1bZlllR9tFwl3y7Oa.cs.Net Code: FTd98HmvpjgaoiAYGpCJOmjPzRknFqUNKZ1 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: XClient.exe, Stub/NIXf95cIBYqgFME2GO1bZlllR9tFwl3y7Oa.cs.Net Code: FTd98HmvpjgaoiAYGpCJOmjPzRknFqUNKZ1
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/NIXf95cIBYqgFME2GO1bZlllR9tFwl3y7Oa.cs.Net Code: nMNfgL0rwqXMNDiB4b1Q51efTU8eaqW7VOv System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/NIXf95cIBYqgFME2GO1bZlllR9tFwl3y7Oa.cs.Net Code: FTd98HmvpjgaoiAYGpCJOmjPzRknFqUNKZ1 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/NIXf95cIBYqgFME2GO1bZlllR9tFwl3y7Oa.cs.Net Code: FTd98HmvpjgaoiAYGpCJOmjPzRknFqUNKZ1
              Source: XClient.exe, Stub/NIXf95cIBYqgFME2GO1bZlllR9tFwl3y7Oa.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'xbYU61LaTe5gz6268VCTlrizEDql9NK37HA', 'nMNfgL0rwqXMNDiB4b1Q51efTU8eaqW7VOv', 'kXbf1qS3qgiiUoEB3qev4MH56Ndp4w7pow4', '31whRjAhj6VXkOsTY6dEyoCirbqWrMf7KCh', 'fcHQt1PeZDXhUUgVl1lT66wALEnTaI0DG0K', 'X6kRzVwBFt4waFH3VJj3fBLMGXbm2LqxjgP', 'CwpPXw6aYD3KnHM9P0JieoFP7QhXOL6tUhN', 'Y5fKn0nc8dAApCduMf0ejhmDLHfRdLCLRtf'
              Source: XClient.exe, Stub/dS3nyInUjs5Mefmh5pPjW60W1Q6ra8DwnF2.csHigh entropy of concatenated method names: '.cctor', 'W9r8eom5kBYPKrq7WwDOgSvK6v5C6AKfy0E', 'fKHIjrQrG0tm8UUBSFAWf11h6w9eXAw9BAO', 'mV6NPuM1NrS2Of6eb1xma4vpkznGgnbqtDM', '11xVnl1EyaC1xliBscVfsLKWKYjFmcvCfsJ', 'TDBwpplbOtuK1EQqEB3z7L2TbJHO2pQdQVW', 'AjRcZbEWpFogZqOGYN0JjEqlOYMG9M5LI0q', 'gXOLaNQMiW1eEZWWr4gdY', 'czFXafqI7jvii0ieS9ZTc', 'bKbnuPN32qhiOONHjZeJN'
              Source: XClient.exe, Stub/MOuDd6f6lqWe581qTPVbm1rE2QeKmeaum8Q.csHigh entropy of concatenated method names: '.ctor', 'QpGClFjjrcOUv8KtPsq9JEzyw7EoKQd2Mw1', 'Tj8LeV3I5tJM8IO2sBm7VAXcH5En0oay1gm', '4Un85SZsjBskOuCb95FpsSIPEyGGZngfInL', 'ICvfWTgvyh2ao4rS7TfH9Z5taklm3gYL9KO', 'fTN4cZoDe7GcmQS1FXDEHo7nkus2xdxiECU', 'HRXoDNa7C7tw8tNfLli2lCeJJiTeJdLMDiP', '80JBp9Ciwwz6ZugNwIhtMx6JGYxgw2vv8WX', 'JETJUVhSKY6hYWqLfkC8zvLuLDMMdRTLZNG', '8dPw226XcBUnFSE8CjVgnCwYAef7FeMTUpZ'
              Source: XClient.exe, Stub/s0U1pZ3hU3f0Al0ZIek8eywCcryNFUX61nR.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'QSgkpYMLcCdVFiAWL0djmg8LFkHeRRYMOsE', 'qcPYfV0QW6pbNORpiIcgqwodMtSOkFYDpmF', 'OhtPsskt7pEqwCjFH9Oz0o2W9P4lpIc76y5', 'pOqCelcxmcQp1cDpOrFoPdsrXYYhQGfFmD9', 'uifaCfe4qtLXDeW4CXkn4EGboVa7XpW9MWV', 'ROnZ04TsRd72QJeh40Y5tnZDHylPVr3gR18', '1vwSqiOiRBjEcdj6He0AZWFix4N006felvL', 'iR1GrTaQvJJeVw5ZTwctsYuKdDIduWZoeuO'
              Source: XClient.exe, Stub/tr7f9pgsmKzflIYAa2lBpTbBZYn7eezwP1K.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'JPLiztoMPwIaF5V5I9010R7BH363IWpetE5', 'iu2Br8tCs2SlA5I7UlvHgWm9dud6GcLRidv', 'iIBaPM8MA9UIW3P1Kbse6TREtgOxmVe5p6m', 'MNAKeXIzWtu8gSJ361ZAfkjUXpQC8gO8gL1', 'UPTxxvAn8SWjJ5L9cKjwPtoX77ArOmh0kRS', 'EHl4NN4PkdA3Noa4IxATjXKLJ6hjwsJ31eD', 'mVpvsE4kjDO6y8nAh05GslFogICHOkNJjzJ', 'y4payuZhPSkMFx3QCrlGOwy8SELLPxsPch5'
              Source: XClient.exe, My/QxUlvO6rHc9wBgbMjMmZg2A6nTzVi4vyLhU.csHigh entropy of concatenated method names: '.cctor', 'OSpfYf5l4TYfGqccb3y7VuopCsQUJ0mSSWp', 'O2pYBz1zbTkeUGJPhmO0bmXuAcdhhCOF7QL', 'DHayv5KDvQa1D5P9qIowFAVPrUZORAfx7gX', 'uhRioRsMef2JQBx4Pa5posSa30VqePVAvu5', 'c6jYb8722ZjMvNH29KG75', 'BqvPA0fBI8MDjAR8sX62s', 'qYRRdAk4hZhDdzVPmilFV', 'wsQJiJUylOKu9ZoysTjQK', '02qQ5gVhBg4lThYeTETtX'
              Source: XClient.exe, Stub/lXMGB3QhUs5UeQzbbzP6ZCZzIohVtIZioNw.csHigh entropy of concatenated method names: '.ctor', 'qkKYQ9l62aa8TXJonVigdGTvl71PJ97DHZ0', 'b9j799c79vSYm29ECYZRGCVoKrSM1wov5qg', 'w8m9XVHN0VGFGyTx6dQtA4349s1eO64omGX', 'WmOoJd4dLqZBxxLmJlLHSG1Q0tiNPmK2UIk', 'UcmDZBXEjIzZG4r8fYABW', 'bdaq9Je8N45jLZh2yhRV8', 'Org5AHdNrnbB8uUdd7nBg', 'NsOAEXLD4Y3oAwuWT2ipj', 'glct00C3MD70TShm4YaCC'
              Source: XClient.exe, Stub/u0030ibt14tLvxNqcXE4Rf0eGzCUCJlLBoXPUk0.csHigh entropy of concatenated method names: '.ctor', '0WJ2lGMud4M1Fgd9Fp863AJNab0eD3U7c13', 'ThrOalaauHEvRqye0EcsADwZmgiZP0Ld0ks', 'GlO3vOAmtM5WTiJrS7kUu67HCTdVMr2fqLs', 'UsTXjuyib7zdYzvr6j2wx', 'R7owXHdlYqrerphyRf8te', 'a6e2bYBS8Q6tAqI62FrPC', 'emsui1LgCt7JyLzrW9gwv', 'ESaJRErHQy1v6MW0p0WS5', 'QPxLmtH027hCJvEBZDmcP'
              Source: XClient.exe, Stub/u4L5p9xINqAuGP6i49BkT4TdKdxaZNEzSEn.csHigh entropy of concatenated method names: '.ctor', 'Ur7Zr0xNLqi9cgrEadwGlsCNCRQRiQhLakC', 'VKOgTBuLX2gjbm4cHfcTwi5niwzsvub6NST', 'khCFAGi4K4T4USZgeP441Zc2pWwtUyg3hvD', 'dBIeq0rhnmbRrbehSQGzP', 'eG7kFptuqeNSeosLRCkb3', 'jGnQAitz98G5wrrDCWeM8', 'v72lQLl1ZCvbqVqPrjG2J', 'IIMShXWPvtGE14r980vIL', '4oGa4jYLE5QQuITL1ZQPg'
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/NIXf95cIBYqgFME2GO1bZlllR9tFwl3y7Oa.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'xbYU61LaTe5gz6268VCTlrizEDql9NK37HA', 'nMNfgL0rwqXMNDiB4b1Q51efTU8eaqW7VOv', 'kXbf1qS3qgiiUoEB3qev4MH56Ndp4w7pow4', '31whRjAhj6VXkOsTY6dEyoCirbqWrMf7KCh', 'fcHQt1PeZDXhUUgVl1lT66wALEnTaI0DG0K', 'X6kRzVwBFt4waFH3VJj3fBLMGXbm2LqxjgP', 'CwpPXw6aYD3KnHM9P0JieoFP7QhXOL6tUhN', 'Y5fKn0nc8dAApCduMf0ejhmDLHfRdLCLRtf'
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/dS3nyInUjs5Mefmh5pPjW60W1Q6ra8DwnF2.csHigh entropy of concatenated method names: '.cctor', 'W9r8eom5kBYPKrq7WwDOgSvK6v5C6AKfy0E', 'fKHIjrQrG0tm8UUBSFAWf11h6w9eXAw9BAO', 'mV6NPuM1NrS2Of6eb1xma4vpkznGgnbqtDM', '11xVnl1EyaC1xliBscVfsLKWKYjFmcvCfsJ', 'TDBwpplbOtuK1EQqEB3z7L2TbJHO2pQdQVW', 'AjRcZbEWpFogZqOGYN0JjEqlOYMG9M5LI0q', 'gXOLaNQMiW1eEZWWr4gdY', 'czFXafqI7jvii0ieS9ZTc', 'bKbnuPN32qhiOONHjZeJN'
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/MOuDd6f6lqWe581qTPVbm1rE2QeKmeaum8Q.csHigh entropy of concatenated method names: '.ctor', 'QpGClFjjrcOUv8KtPsq9JEzyw7EoKQd2Mw1', 'Tj8LeV3I5tJM8IO2sBm7VAXcH5En0oay1gm', '4Un85SZsjBskOuCb95FpsSIPEyGGZngfInL', 'ICvfWTgvyh2ao4rS7TfH9Z5taklm3gYL9KO', 'fTN4cZoDe7GcmQS1FXDEHo7nkus2xdxiECU', 'HRXoDNa7C7tw8tNfLli2lCeJJiTeJdLMDiP', '80JBp9Ciwwz6ZugNwIhtMx6JGYxgw2vv8WX', 'JETJUVhSKY6hYWqLfkC8zvLuLDMMdRTLZNG', '8dPw226XcBUnFSE8CjVgnCwYAef7FeMTUpZ'
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/s0U1pZ3hU3f0Al0ZIek8eywCcryNFUX61nR.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'QSgkpYMLcCdVFiAWL0djmg8LFkHeRRYMOsE', 'qcPYfV0QW6pbNORpiIcgqwodMtSOkFYDpmF', 'OhtPsskt7pEqwCjFH9Oz0o2W9P4lpIc76y5', 'pOqCelcxmcQp1cDpOrFoPdsrXYYhQGfFmD9', 'uifaCfe4qtLXDeW4CXkn4EGboVa7XpW9MWV', 'ROnZ04TsRd72QJeh40Y5tnZDHylPVr3gR18', '1vwSqiOiRBjEcdj6He0AZWFix4N006felvL', 'iR1GrTaQvJJeVw5ZTwctsYuKdDIduWZoeuO'
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/tr7f9pgsmKzflIYAa2lBpTbBZYn7eezwP1K.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'JPLiztoMPwIaF5V5I9010R7BH363IWpetE5', 'iu2Br8tCs2SlA5I7UlvHgWm9dud6GcLRidv', 'iIBaPM8MA9UIW3P1Kbse6TREtgOxmVe5p6m', 'MNAKeXIzWtu8gSJ361ZAfkjUXpQC8gO8gL1', 'UPTxxvAn8SWjJ5L9cKjwPtoX77ArOmh0kRS', 'EHl4NN4PkdA3Noa4IxATjXKLJ6hjwsJ31eD', 'mVpvsE4kjDO6y8nAh05GslFogICHOkNJjzJ', 'y4payuZhPSkMFx3QCrlGOwy8SELLPxsPch5'
              Source: 0.0.XClient.exe.8b0000.0.unpack, My/QxUlvO6rHc9wBgbMjMmZg2A6nTzVi4vyLhU.csHigh entropy of concatenated method names: '.cctor', 'OSpfYf5l4TYfGqccb3y7VuopCsQUJ0mSSWp', 'O2pYBz1zbTkeUGJPhmO0bmXuAcdhhCOF7QL', 'DHayv5KDvQa1D5P9qIowFAVPrUZORAfx7gX', 'uhRioRsMef2JQBx4Pa5posSa30VqePVAvu5', 'c6jYb8722ZjMvNH29KG75', 'BqvPA0fBI8MDjAR8sX62s', 'qYRRdAk4hZhDdzVPmilFV', 'wsQJiJUylOKu9ZoysTjQK', '02qQ5gVhBg4lThYeTETtX'
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/u4L5p9xINqAuGP6i49BkT4TdKdxaZNEzSEn.csHigh entropy of concatenated method names: '.ctor', 'Ur7Zr0xNLqi9cgrEadwGlsCNCRQRiQhLakC', 'VKOgTBuLX2gjbm4cHfcTwi5niwzsvub6NST', 'khCFAGi4K4T4USZgeP441Zc2pWwtUyg3hvD', 'dBIeq0rhnmbRrbehSQGzP', 'eG7kFptuqeNSeosLRCkb3', 'jGnQAitz98G5wrrDCWeM8', 'v72lQLl1ZCvbqVqPrjG2J', 'IIMShXWPvtGE14r980vIL', '4oGa4jYLE5QQuITL1ZQPg'
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/u0030ibt14tLvxNqcXE4Rf0eGzCUCJlLBoXPUk0.csHigh entropy of concatenated method names: '.ctor', '0WJ2lGMud4M1Fgd9Fp863AJNab0eD3U7c13', 'ThrOalaauHEvRqye0EcsADwZmgiZP0Ld0ks', 'GlO3vOAmtM5WTiJrS7kUu67HCTdVMr2fqLs', 'UsTXjuyib7zdYzvr6j2wx', 'R7owXHdlYqrerphyRf8te', 'a6e2bYBS8Q6tAqI62FrPC', 'emsui1LgCt7JyLzrW9gwv', 'ESaJRErHQy1v6MW0p0WS5', 'QPxLmtH027hCJvEBZDmcP'
              Source: 0.0.XClient.exe.8b0000.0.unpack, Stub/lXMGB3QhUs5UeQzbbzP6ZCZzIohVtIZioNw.csHigh entropy of concatenated method names: '.ctor', 'qkKYQ9l62aa8TXJonVigdGTvl71PJ97DHZ0', 'b9j799c79vSYm29ECYZRGCVoKrSM1wov5qg', 'w8m9XVHN0VGFGyTx6dQtA4349s1eO64omGX', 'WmOoJd4dLqZBxxLmJlLHSG1Q0tiNPmK2UIk', 'UcmDZBXEjIzZG4r8fYABW', 'bdaq9Je8N45jLZh2yhRV8', 'Org5AHdNrnbB8uUdd7nBg', 'NsOAEXLD4Y3oAwuWT2ipj', 'glct00C3MD70TShm4YaCC'
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: XClient.exe, 00000000.00000002.654685537.0000000002AE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: XClient.exeBinary or memory string: SBIEDLL.DLL+T0XIDNM41PJCRQ8SQZSPP+YHXHO6ABBR87ZPLIL9AZ0+QSQAS8KSQQXPT1ZJ6VXZM+MLFKF6J7NY7YJHDA96RS6+4F8KSQRFTQR7ZDSDOLAHZ+F6OYQSIATAOGV3HI2HMRN+M7DJHCYOQSBRPA49CAW60+SWE44PRJNZMLELUMLGL44+SXFE8WHJIRT6O9SAYDG8D+UNVAWUFXNBHNK3BJFLQNP+YDSXPEB6S15YQEKKFK3F6+JNEAW2EGLCDBTGIKL01LM+ACLFQ6RUC2SLYLOLUYNVC+KDBEITFRC0ESSC6H1XN05INFO
              Source: C:\Users\user\Desktop\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
              Source: C:\Users\user\Desktop\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: XClient.exeBinary or memory string: vmware
              Source: XClient.exe, 00000000.00000002.654935664.000000001B920000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

              Anti Debugging

              barindex
              Source: C:\Users\user\Desktop\XClient.exeCode function: 0_2_00007FF9A5885D6A CheckRemoteDebuggerPresent,0_2_00007FF9A5885D6A
              Source: C:\Users\user\Desktop\XClient.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeQueries volume information: C:\Users\user\Desktop\XClient.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\XClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: XClient.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.XClient.exe.8b0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.386459266.00000000008B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: XClient.exe PID: 7016, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: XClient.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.XClient.exe.8b0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.386459266.00000000008B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: XClient.exe PID: 7016, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1
              Windows Management Instrumentation
              Path InterceptionPath Interception2
              Virtualization/Sandbox Evasion
              OS Credential Dumping221
              Security Software Discovery
              Remote Services1
              Screen Capture
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              Disable or Modify Tools
              LSASS Memory2
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol11
              Archive Collected Data
              Exfiltration Over Bluetooth1
              Ingress Tool Transfer
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
              Deobfuscate/Decode Files or Information
              Security Account Manager1
              Remote System Discovery
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
              Non-Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
              Software Packing
              NTDS1
              System Network Configuration Discovery
              Distributed Component Object ModelInput CaptureScheduled Transfer12
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets23
              System Information Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 869012 Sample: XClient.exe Startdate: 18/05/2023 Architecture: WINDOWS Score: 100 11 Multi AV Scanner detection for domain / URL 2->11 13 Found malware configuration 2->13 15 Malicious sample detected (through community Yara rule) 2->15 17 11 other signatures 2->17 5 XClient.exe 14 2 2->5         started        process3 dnsIp4 9 ip-api.com 208.95.112.1, 49705, 80 TUT-ASUS United States 5->9 19 May check the online IP address of the machine 5->19 21 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 5->21 signatures5

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              XClient.exe76%ReversingLabsByteCode-MSIL.Trojan.AsyncRAT
              XClient.exe75%VirustotalBrowse
              XClient.exe100%AviraLNK/Runner.VPGD
              XClient.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://ip-api.comx0%URL Reputationsafe
              even-house.at.ply.gg100%Avira URL Cloudmalware
              even-house.at.ply.gg8%VirustotalBrowse

              Download Network PCAP: filteredfull

              NameIPActiveMaliciousAntivirus DetectionReputation
              ip-api.com
              208.95.112.1
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                even-house.at.ply.ggtrue
                • 8%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                http://ip-api.com/line/?fields=hostingfalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameXClient.exe, 00000000.00000002.654685537.0000000002B75000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://ip-api.comxXClient.exe, 00000000.00000002.654685537.0000000002B75000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://ip-api.comXClient.exe, 00000000.00000002.654685537.0000000002B75000.00000004.00000800.00020000.00000000.sdmp, XClient.exe, 00000000.00000002.654685537.0000000002B8E000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      208.95.112.1
                      ip-api.comUnited States
                      53334TUT-ASUSfalse
                      Joe Sandbox Version:37.1.0 Beryl
                      Analysis ID:869012
                      Start date and time:2023-05-18 16:35:20 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 5m 58s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:5
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample file name:XClient.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@1/0@1/1
                      EGA Information:Failed
                      HDC Information:Failed
                      HCA Information:
                      • Successful, ratio: 95%
                      • Number of executed functions: 6
                      • Number of non-executed functions: 1
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 204.79.197.222
                      • Excluded domains from analysis (whitelisted): fp.msedge.net, a-0019.a-msedge.net, ocsp.digicert.com, a-0019.standard.a-msedge.net, ctldl.windowsupdate.com, 1.perf.msedge.net
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      No simulations
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      208.95.112.1runrunlastrun.vbsGet hashmaliciousQuasarBrowse
                      • ip-api.com/json/
                      jod.jsGet hashmaliciousClipboard Hijacker, QuasarBrowse
                      • ip-api.com/json/
                      shipment_docs.jsGet hashmaliciousWSHRATBrowse
                      • ip-api.com/json/
                      Tax_Returns_of_R58,765.jsGet hashmaliciousWSHRATBrowse
                      • ip-api.com/json/
                      proof_of_payment.jsGet hashmaliciousWSHRATBrowse
                      • ip-api.com/json/
                      KeyboardRGB.exeGet hashmaliciousUnknownBrowse
                      • ip-api.com/line/?fields=hosting
                      Request_For_Quotation.jsGet hashmaliciousWSHRATBrowse
                      • ip-api.com/json/
                      file.exeGet hashmaliciousAsyncRAT, XWormBrowse
                      • ip-api.com/line/?fields=hosting
                      sss.png.ps1Get hashmaliciousQuasarBrowse
                      • ip-api.com/json/
                      stub.exeGet hashmaliciousQuasarBrowse
                      • ip-api.com/json/
                      8888.exeGet hashmaliciousXWormBrowse
                      • ip-api.com/line/?fields=hosting
                      Clientrat.exeGet hashmaliciousQuasarBrowse
                      • ip-api.com/json/
                      CrackedLoader.exeGet hashmaliciousXWormBrowse
                      • ip-api.com/line/?fields=hosting
                      Explorer.exeGet hashmaliciousAsyncRAT, XWormBrowse
                      • ip-api.com/line/?fields=hosting
                      SecuriteInfo.com.Win64.Trojan-gen.31951.26059.exeGet hashmaliciousUnknownBrowse
                      • ip-api.com/json/?fields=query,status,countryCode,city,timezone
                      SecuriteInfo.com.Win64.Trojan-gen.31951.26059.exeGet hashmaliciousUnknownBrowse
                      • ip-api.com/json/?fields=query,status,countryCode,city,timezone
                      HelloKittyCafe.exeGet hashmaliciousXWormBrowse
                      • ip-api.com/line/?fields=hosting
                      SrfFpGhGIc.exeGet hashmaliciousVjW0rm, WSHRATBrowse
                      • ip-api.com/json/
                      LOIC.exeGet hashmaliciousUnknownBrowse
                      • ip-api.com/line/?fields=hosting
                      PeterBot.exeGet hashmaliciousUnknownBrowse
                      • ip-api.com/line/?fields=hosting
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      ip-api.comrunrunlastrun.vbsGet hashmaliciousQuasarBrowse
                      • 208.95.112.1
                      jod.jsGet hashmaliciousClipboard Hijacker, QuasarBrowse
                      • 208.95.112.1
                      shipment_docs.jsGet hashmaliciousWSHRATBrowse
                      • 208.95.112.1
                      Tax_Returns_of_R58,765.jsGet hashmaliciousWSHRATBrowse
                      • 208.95.112.1
                      proof_of_payment.jsGet hashmaliciousWSHRATBrowse
                      • 208.95.112.1
                      KeyboardRGB.exeGet hashmaliciousUnknownBrowse
                      • 208.95.112.1
                      Request_For_Quotation.jsGet hashmaliciousWSHRATBrowse
                      • 208.95.112.1
                      mal.exeGet hashmaliciousUnknownBrowse
                      • 208.95.112.1
                      meeting.exeGet hashmaliciousUnknownBrowse
                      • 208.95.112.1
                      p68hEdbp8M.exeGet hashmaliciousGurcu Stealer, RedLine, VidarBrowse
                      • 208.95.112.1
                      Invoice ID#8998744.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 51.77.64.70
                      file.exeGet hashmaliciousAsyncRAT, XWormBrowse
                      • 208.95.112.1
                      sss.png.ps1Get hashmaliciousQuasarBrowse
                      • 208.95.112.1
                      6wXMsDIz1A.exeGet hashmaliciousGurcu Stealer, RedLineBrowse
                      • 208.95.112.1
                      stub.exeGet hashmaliciousQuasarBrowse
                      • 208.95.112.1
                      8888.exeGet hashmaliciousXWormBrowse
                      • 208.95.112.1
                      Clientrat.exeGet hashmaliciousQuasarBrowse
                      • 208.95.112.1
                      CrackedLoader.exeGet hashmaliciousXWormBrowse
                      • 208.95.112.1
                      Explorer.exeGet hashmaliciousAsyncRAT, XWormBrowse
                      • 208.95.112.1
                      SecuriteInfo.com.Win64.Trojan-gen.31951.26059.exeGet hashmaliciousUnknownBrowse
                      • 208.95.112.1
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      TUT-ASUSrunrunlastrun.vbsGet hashmaliciousQuasarBrowse
                      • 208.95.112.1
                      jod.jsGet hashmaliciousClipboard Hijacker, QuasarBrowse
                      • 208.95.112.1
                      shipment_docs.jsGet hashmaliciousWSHRATBrowse
                      • 208.95.112.1
                      Tax_Returns_of_R58,765.jsGet hashmaliciousWSHRATBrowse
                      • 208.95.112.1
                      proof_of_payment.jsGet hashmaliciousWSHRATBrowse
                      • 208.95.112.1
                      KeyboardRGB.exeGet hashmaliciousUnknownBrowse
                      • 208.95.112.1
                      Request_For_Quotation.jsGet hashmaliciousWSHRATBrowse
                      • 208.95.112.1
                      mal.exeGet hashmaliciousUnknownBrowse
                      • 208.95.112.1
                      meeting.exeGet hashmaliciousUnknownBrowse
                      • 208.95.112.1
                      p68hEdbp8M.exeGet hashmaliciousGurcu Stealer, RedLine, VidarBrowse
                      • 208.95.112.1
                      file.exeGet hashmaliciousAsyncRAT, XWormBrowse
                      • 208.95.112.1
                      sss.png.ps1Get hashmaliciousQuasarBrowse
                      • 208.95.112.1
                      6wXMsDIz1A.exeGet hashmaliciousGurcu Stealer, RedLineBrowse
                      • 208.95.112.1
                      socialscrapper.exeGet hashmaliciousGurcu StealerBrowse
                      • 208.95.112.1
                      stub.exeGet hashmaliciousQuasarBrowse
                      • 208.95.112.1
                      8888.exeGet hashmaliciousXWormBrowse
                      • 208.95.112.1
                      Clientrat.exeGet hashmaliciousQuasarBrowse
                      • 208.95.112.1
                      CrackedLoader.exeGet hashmaliciousXWormBrowse
                      • 208.95.112.1
                      Explorer.exeGet hashmaliciousAsyncRAT, XWormBrowse
                      • 208.95.112.1
                      SecuriteInfo.com.Win64.Trojan-gen.31951.26059.exeGet hashmaliciousUnknownBrowse
                      • 208.95.112.1
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):5.951936788865578
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                      • Win32 Executable (generic) a (10002005/4) 49.75%
                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                      • Windows Screen Saver (13104/52) 0.07%
                      • Generic Win/DOS Executable (2004/3) 0.01%
                      File name:XClient.exe
                      File size:64512
                      MD5:25a16f364fa103d6d2ab254065bfe2d2
                      SHA1:1759fb535c7514d063d12e3687856507d7ec9bc7
                      SHA256:2698fb5c3c46ef781958f43e418e2a193b97b3d09900678650ba2190c1cea15e
                      SHA512:13929145f9773b6bf44f19041eb3e05501d4f63a08c9aa4bdfac964599b8125be9aae4be2f9512de4580256325e28b46062e5668401ec10fbc97c5d96e07b57a
                      SSDEEP:768:yw2dR2qCflaItGpeZgncUAHKr/TN31M2IybbEUgdLGk6u41O6ihciYcqTWUZ:G2ZLGbxasb7gwk6bO6i6iVqCE
                      TLSH:CC537D5C37E54920E1FF1FB428B53217D735E757A803EA1F2889059A1A27A9CCE017E6
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...._cd................................. ... ....@.. .......................`............@................................
                      Icon Hash:90cececece8e8eb0
                      Entrypoint:0x4110ae
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x64635F10 [Tue May 16 10:46:40 2023 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x110580x53.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x4ce.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000xf0b40xf200False0.5801426911157025data6.03848119601686IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0x120000x4ce0x600False0.3743489583333333data3.7196984311115475IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x140000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_VERSION0x120a00x244data
                      RT_MANIFEST0x122e40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                      DLLImport
                      mscoree.dll_CorExeMain

                      Download Network PCAP: filteredfull

                      • Total Packets: 6
                      • 80 (HTTP)
                      • 53 (DNS)
                      TimestampSource PortDest PortSource IPDest IP
                      May 18, 2023 16:36:23.427736044 CEST4970580192.168.2.5208.95.112.1
                      May 18, 2023 16:36:23.457145929 CEST8049705208.95.112.1192.168.2.5
                      May 18, 2023 16:36:23.457341909 CEST4970580192.168.2.5208.95.112.1
                      May 18, 2023 16:36:23.461499929 CEST4970580192.168.2.5208.95.112.1
                      May 18, 2023 16:36:23.498827934 CEST8049705208.95.112.1192.168.2.5
                      May 18, 2023 16:36:23.550524950 CEST4970580192.168.2.5208.95.112.1
                      May 18, 2023 16:37:12.670042038 CEST8049705208.95.112.1192.168.2.5
                      May 18, 2023 16:37:12.670164108 CEST4970580192.168.2.5208.95.112.1
                      May 18, 2023 16:37:29.592516899 CEST8049705208.95.112.1192.168.2.5
                      TimestampSource PortDest PortSource IPDest IP
                      May 18, 2023 16:36:23.388999939 CEST6189353192.168.2.58.8.8.8
                      May 18, 2023 16:36:23.416227102 CEST53618938.8.8.8192.168.2.5
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      May 18, 2023 16:36:23.388999939 CEST192.168.2.58.8.8.80x40a5Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      May 18, 2023 16:36:23.416227102 CEST8.8.8.8192.168.2.50x40a5No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                      May 18, 2023 16:36:37.890830994 CEST8.8.8.8192.168.2.50x923aNo error (0)a-0019.a.dns.azurefd.neta-0019.standard.a-msedge.netCNAME (Canonical name)IN (0x0001)false
                      • ip-api.com
                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      0192.168.2.549705208.95.112.180C:\Users\user\Desktop\XClient.exe
                      TimestampkBytes transferredDirectionData
                      May 18, 2023 16:36:23.461499929 CEST0OUTGET /line/?fields=hosting HTTP/1.1
                      Host: ip-api.com
                      Connection: Keep-Alive
                      May 18, 2023 16:36:23.498827934 CEST0INHTTP/1.1 200 OK
                      Date: Thu, 18 May 2023 14:36:22 GMT
                      Content-Type: text/plain; charset=utf-8
                      Content-Length: 5
                      Access-Control-Allow-Origin: *
                      X-Ttl: 60
                      X-Rl: 44
                      Data Raw: 74 72 75 65 0a
                      Data Ascii: true


                      050100s020406080100

                      Click to jump to process

                      050100s0.001020MB

                      Click to jump to process

                      • File
                      • Registry
                      • Network

                      Click to dive into process behavior distribution

                      Target ID:0
                      Start time:16:36:17
                      Start date:18/05/2023
                      Path:C:\Users\user\Desktop\XClient.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Users\user\Desktop\XClient.exe
                      Imagebase:0x8b0000
                      File size:64512 bytes
                      MD5 hash:25A16F364FA103D6D2AB254065BFE2D2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Yara matches:
                      • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.386459266.00000000008B2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.386459266.00000000008B2000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                      Reputation:low
                      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                      Executed Functions

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.655199024.00007FF9A5880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5880000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID: 8e7
                      • API String ID: 0-3004964361
                      • Opcode ID: 15f7b047bbf02ee7290dc586c110a6d95b77dba3daad209c3c10eca77945176b
                      • Instruction ID: 77b6cc88664c3e4785b538868b0a23c3b3cd22a20dab06b2339c698280c98a42
                      • Opcode Fuzzy Hash: 15f7b047bbf02ee7290dc586c110a6d95b77dba3daad209c3c10eca77945176b
                      • Instruction Fuzzy Hash: 7CF1B630A08A4D8FEBA8DF28D8567E977D1FF65310F04426EE84DC7291DF74A9458B82
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.655199024.00007FF9A5880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5880000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID: 8e7
                      • API String ID: 0-3004964361
                      • Opcode ID: 330e29b101b7efa7a2f57319115c981d41d8045d7a724f1dcded60abe5f9c77d
                      • Instruction ID: 421ab0244fa888b5f3a0874e823f402dc861d75097c03d5a936f8b72afbc8b9f
                      • Opcode Fuzzy Hash: 330e29b101b7efa7a2f57319115c981d41d8045d7a724f1dcded60abe5f9c77d
                      • Instruction Fuzzy Hash: FAE1C330A09A4E8FEBA8DF28D8557E977D1FF65710F14826ED84DC7291DF74A8408B82
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.655199024.00007FF9A5880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5880000, based on PE: false
                      Similarity
                      • API ID: CheckDebuggerPresentRemote
                      • String ID:
                      • API String ID: 3662101638-0
                      • Opcode ID: 58581b123dbbe8c2a063eb6c662df2982441b00d1da74c60002490bdd2baf84d
                      • Instruction ID: 741dc8c80716005b88ba1f73848e46ed2f77c1467fb210a438cc5c0737b9602b
                      • Opcode Fuzzy Hash: 58581b123dbbe8c2a063eb6c662df2982441b00d1da74c60002490bdd2baf84d
                      • Instruction Fuzzy Hash: 3531D23190861C8FCB58DF5CD8897ED7BE0FF69711F14426ED88AD7281DB70A8468B91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.655199024.00007FF9A5880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5880000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 844d596102d2795afa26235d3635af6879b9498fe8a96c2ae69864389b1a3460
                      • Instruction ID: a3aa74f33c931b9d872da57bcaebb9a1929d5fb263a3f6036f301e2f3a013b9a
                      • Opcode Fuzzy Hash: 844d596102d2795afa26235d3635af6879b9498fe8a96c2ae69864389b1a3460
                      • Instruction Fuzzy Hash: 14428460B18A094FE798EB7CA4953B977D2FF9A740F4445B9E44EC32D6DE68BC024381
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.655199024.00007FF9A5880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5880000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f5f059ae707af8525380e2bc58f5d408e5046b788f35561b14c58d8aa4c65afb
                      • Instruction ID: b37e9f6139a6b40d43b350a966fcd14a60704e58db7df95a840fabba29931eae
                      • Opcode Fuzzy Hash: f5f059ae707af8525380e2bc58f5d408e5046b788f35561b14c58d8aa4c65afb
                      • Instruction Fuzzy Hash: EC61016465E6C54FD746E77C58646B6BFE5DF87225B1800FBE0CDC61A3ED481806C382
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.655199024.00007FF9A5880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5880000, based on PE: false
                      Similarity
                      • API ID: CheckDebuggerPresentRemote
                      • String ID:
                      • API String ID: 3662101638-0
                      • Opcode ID: 84800cf6d5126da03a5828cc197403f319658e9cad008f50eedc3d7e5ebb61f7
                      • Instruction ID: fb3fd805ff1e54f3a9827061c76df95341c0778794268f7edbe9c591be8541ef
                      • Opcode Fuzzy Hash: 84800cf6d5126da03a5828cc197403f319658e9cad008f50eedc3d7e5ebb61f7
                      • Instruction Fuzzy Hash: DE3121309087588FCB19DF68C8457E97BF0FF66311F0542ABD489D7192DB34A846CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Non-executed Functions

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.655199024.00007FF9A5880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A5880000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID: 5`_^
                      • API String ID: 0-529932743
                      • Opcode ID: f2dea267dd3b8f97094c10583a0c6ca03056eac79f8cd000a005364ae59bd281
                      • Instruction ID: 1783a652457fbcdb6b9d3be2b55114bfcd708ca179b2218d91012a5bcfbfdb6f
                      • Opcode Fuzzy Hash: f2dea267dd3b8f97094c10583a0c6ca03056eac79f8cd000a005364ae59bd281
                      • Instruction Fuzzy Hash: 87715267E0E2928FE752DB3C68951E57F60EF53664B0940F7C4D8DB0A3E948380E83A5
                      Uniqueness

                      Uniqueness Score: -1.00%