General
-
Target
XClient.exe
-
Size
78KB
-
Sample
240415-nrjf6sdd46
-
MD5
08a0de0b53d4a1f754e89317e97cc876
-
SHA1
79aa570739ea7ce828df347852fe7cd7947eab73
-
SHA256
32f70eace4fb8d3d0711c104f7d9ed18a3e7b62c4eb44e6ee8fa2fef9101fb40
-
SHA512
b7d828778f4def78b0f6b8ec7112c1e002656aafae3e355cb5498155a898a5361dcd75fc2673111ace6aae7edd309b6aa2daa1eb9d9503ddc693de4a21a22423
-
SSDEEP
1536:EruZeKyBO87fRW6IxjbXtL6Kvvqsu6wGistrOO7XTZqAATQ:CuYHB5Wdhb9Lz3wOpqRQ
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240319-en
Malware Config
Extracted
xworm
daily-lawn.gl.at.ply.gg:28256
-
Install_directory
%Public%
-
install_file
XClient.exe
Extracted
44caliber
https://discord.com/api/webhooks/1229291998217900033/GZFkLc0s0Q0ECz4_Tuxz0BFCTwRpQTyBwxULLeHGGvrfOVLwLMhvhN6RoOgaFkDcUzK5
Targets
-
-
Target
XClient.exe
-
Size
78KB
-
MD5
08a0de0b53d4a1f754e89317e97cc876
-
SHA1
79aa570739ea7ce828df347852fe7cd7947eab73
-
SHA256
32f70eace4fb8d3d0711c104f7d9ed18a3e7b62c4eb44e6ee8fa2fef9101fb40
-
SHA512
b7d828778f4def78b0f6b8ec7112c1e002656aafae3e355cb5498155a898a5361dcd75fc2673111ace6aae7edd309b6aa2daa1eb9d9503ddc693de4a21a22423
-
SSDEEP
1536:EruZeKyBO87fRW6IxjbXtL6Kvvqsu6wGistrOO7XTZqAATQ:CuYHB5Wdhb9Lz3wOpqRQ
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1