General
-
Target
XClient.exe
-
Size
65KB
-
Sample
240422-be7a9adc83
-
MD5
f89900bee0847f4f1e23b1bfda0e7f24
-
SHA1
24dd536801cff4b3b92276a52a9280069290149a
-
SHA256
82f0fb933a96858aabe6b741c889611583a0a11132ee6ecd70909fc0aa6cf534
-
SHA512
bba995bfb14d6d79b8f4feb0934888d2e5d39d7c945cce2046e842a0c0240cc14a9998c3d18093c29ca36c840f580058518df341e0dca3f5452fdc7fcacdcc3a
-
SSDEEP
1536:/JPMoSzJ4aZfY0by1DLub8ldJJIrlXOF3+v/:BZcJm0WxSb8elXOhW/
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
xworm
127.0.0.1:33920
original-taught.gl.at.ply.gg:33920
-
Install_directory
%AppData%
-
install_file
FreePornHubPremium.exe
Targets
-
-
Target
XClient.exe
-
Size
65KB
-
MD5
f89900bee0847f4f1e23b1bfda0e7f24
-
SHA1
24dd536801cff4b3b92276a52a9280069290149a
-
SHA256
82f0fb933a96858aabe6b741c889611583a0a11132ee6ecd70909fc0aa6cf534
-
SHA512
bba995bfb14d6d79b8f4feb0934888d2e5d39d7c945cce2046e842a0c0240cc14a9998c3d18093c29ca36c840f580058518df341e0dca3f5452fdc7fcacdcc3a
-
SSDEEP
1536:/JPMoSzJ4aZfY0by1DLub8ldJJIrlXOF3+v/:BZcJm0WxSb8elXOhW/
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-