General
-
Target
3f1e8e3609e6ffd53453d5ce0ca33dc7eaf06e55085d7f6c43d0c4b6df1f974f.exe
-
Size
166KB
-
Sample
240421-kfzggafa99
-
MD5
67183ea2fdfbaace4c265de91e218c59
-
SHA1
a66c33b7d7d27bc5153f53d672b2f7c7d36c2ae8
-
SHA256
3f1e8e3609e6ffd53453d5ce0ca33dc7eaf06e55085d7f6c43d0c4b6df1f974f
-
SHA512
0eca1d1f216e81c6000ab24d9c25f25ed5f6d7a2d5b97c73093ffb771c399e8b98e1b95890ff0d0326a6f00f9c2606947c03aa91a30c9b7d0106b34dc0978622
-
SSDEEP
3072:ubYexkjTk/btjQAzsOSrDGM+lmsolAIrRuw+mqv9j1MWLQZ:u0e62byAzw+lDAA
Behavioral task
behavioral1
Sample
3f1e8e3609e6ffd53453d5ce0ca33dc7eaf06e55085d7f6c43d0c4b6df1f974f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f1e8e3609e6ffd53453d5ce0ca33dc7eaf06e55085d7f6c43d0c4b6df1f974f.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
xworm
93.123.39.225:7000
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
telegram
https://api.telegram.org/bot6769459273:AAE8rusUI57P-Uj11j60b70AidMpGMPPq1E/sendMessage?chat_id=6862736136
Targets
-
-
Target
3f1e8e3609e6ffd53453d5ce0ca33dc7eaf06e55085d7f6c43d0c4b6df1f974f.exe
-
Size
166KB
-
MD5
67183ea2fdfbaace4c265de91e218c59
-
SHA1
a66c33b7d7d27bc5153f53d672b2f7c7d36c2ae8
-
SHA256
3f1e8e3609e6ffd53453d5ce0ca33dc7eaf06e55085d7f6c43d0c4b6df1f974f
-
SHA512
0eca1d1f216e81c6000ab24d9c25f25ed5f6d7a2d5b97c73093ffb771c399e8b98e1b95890ff0d0326a6f00f9c2606947c03aa91a30c9b7d0106b34dc0978622
-
SSDEEP
3072:ubYexkjTk/btjQAzsOSrDGM+lmsolAIrRuw+mqv9j1MWLQZ:u0e62byAzw+lDAA
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-