General
-
Target
XClient.exe
-
Size
61KB
-
Sample
230708-nc3lhafe31
-
MD5
654a9a23f94cdcfe31cdd98cd7e9dd1f
-
SHA1
3e7fab38617cce17abc79b5c87fbdd9597940cda
-
SHA256
c54430b097c3220bf89dceac9e0e4ecfa6ab95302b30830e0c4f0aa64d617267
-
SHA512
e75b67e6b907c58a5f55a308618ba7311114da347c0d48ff8a7304986348115d917d654e65a81903ef82d005ee548e43e35b74b78c3de54fe7e17d32ac20a87c
-
SSDEEP
1536:cfBPd1ylaxTobN2bN4R1DL66Z/TpYOR/P3:cf1ylsYgbNwlVT+ORn3
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
xworm
WNIKO1-39869.portmap.host:39869
-
install_file
USB.exe
Targets
-
-
Target
XClient.exe
-
Size
61KB
-
MD5
654a9a23f94cdcfe31cdd98cd7e9dd1f
-
SHA1
3e7fab38617cce17abc79b5c87fbdd9597940cda
-
SHA256
c54430b097c3220bf89dceac9e0e4ecfa6ab95302b30830e0c4f0aa64d617267
-
SHA512
e75b67e6b907c58a5f55a308618ba7311114da347c0d48ff8a7304986348115d917d654e65a81903ef82d005ee548e43e35b74b78c3de54fe7e17d32ac20a87c
-
SSDEEP
1536:cfBPd1ylaxTobN2bN4R1DL66Z/TpYOR/P3:cf1ylsYgbNwlVT+ORn3
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-