General
-
Target
XClient.exe
-
Size
188KB
-
Sample
240413-mrrl4sch46
-
MD5
06950fafb2ebce7778eb434a21e7c80c
-
SHA1
d0fec48dc1fdf9070e28eee9468fa8884407ed0c
-
SHA256
b89f6b26295ea93ead52dbec7441967366ba1edb495570f28aa63b29817498c4
-
SHA512
b6d231f24edd806bc8ab74f41ea9b1e1c0bc15fba11ee225ab02adfc59e4cf7fa31a5520218c7ab4c4082594cf30d778e8b18889c7fbb6593ccd2bdba84c6b03
-
SSDEEP
3072:7S19nA+bYl7OU264NpVq8BxFRzaqF+o2GQJ7/JzqVfGvp:7AhbcA6gVqwlL
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win11-20240412-en
Malware Config
Extracted
xworm
-
Install_directory
%ProgramData%
-
install_file
Chrome.exe
-
pastebin_url
https://pastebin.com/raw/SskbLNL2
-
telegram
https://api.telegram.org/bot6908115126:AAFK7X8EwJCyolcIuYpa614_tJ0H4OcVQu8/sendMessage?chat_id=939716992
Targets
-
-
Target
XClient.exe
-
Size
188KB
-
MD5
06950fafb2ebce7778eb434a21e7c80c
-
SHA1
d0fec48dc1fdf9070e28eee9468fa8884407ed0c
-
SHA256
b89f6b26295ea93ead52dbec7441967366ba1edb495570f28aa63b29817498c4
-
SHA512
b6d231f24edd806bc8ab74f41ea9b1e1c0bc15fba11ee225ab02adfc59e4cf7fa31a5520218c7ab4c4082594cf30d778e8b18889c7fbb6593ccd2bdba84c6b03
-
SSDEEP
3072:7S19nA+bYl7OU264NpVq8BxFRzaqF+o2GQJ7/JzqVfGvp:7AhbcA6gVqwlL
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1