General
-
Target
XClient.exe
-
Size
86KB
-
Sample
240311-v7c3nabf63
-
MD5
2473c3e8b3d22cbfaa9b5d8115f6166b
-
SHA1
71e87a094f3e4686839bcc073ae9b0ac7a371ebf
-
SHA256
3d812652bff62c3321446e5591acb27f2b40e4d42872c3629588bfc2ac31151b
-
SHA512
51ea5719bfac698f029cd02f74384ec2d88cd7bec858c4fcb5887cb31488f9aea387ee5d057dc6efb2940ef56bd0bc423d9771d6ddb7436644ada94a35f556d2
-
SSDEEP
1536:M5EkmroQStrBcx9B4YD8yto0En9bBAbFAJxxo96uODf6JT+zo:0ErqWR4k8ytoLn9b8ASO7WUo
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
xworm
story-pl.gl.at.ply.gg:13978
-
Install_directory
%Temp%
-
install_file
MicrosoftAudioDriver.exe
Targets
-
-
Target
XClient.exe
-
Size
86KB
-
MD5
2473c3e8b3d22cbfaa9b5d8115f6166b
-
SHA1
71e87a094f3e4686839bcc073ae9b0ac7a371ebf
-
SHA256
3d812652bff62c3321446e5591acb27f2b40e4d42872c3629588bfc2ac31151b
-
SHA512
51ea5719bfac698f029cd02f74384ec2d88cd7bec858c4fcb5887cb31488f9aea387ee5d057dc6efb2940ef56bd0bc423d9771d6ddb7436644ada94a35f556d2
-
SSDEEP
1536:M5EkmroQStrBcx9B4YD8yto0En9bBAbFAJxxo96uODf6JT+zo:0ErqWR4k8ytoLn9b8ASO7WUo
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-