General
-
Target
GTAGLagPatcher.exe
-
Size
70KB
-
Sample
240504-1m8lqacb91
-
MD5
a465ea357cae35a66da7279a592e25c5
-
SHA1
fb20362c444ea4fbdc14597b78eee66c5b9c2a44
-
SHA256
fb74bd701a497dc3451d70bb8ed961303c6a6552fbcfc0c685015163748cdf12
-
SHA512
bc88851b92eb39cc22a41f1e6d6425fa061b8e1abdc8a9f0b51d76f67df38158fbc19872f9b2ccc4a50e090067a11f047bbf5b282dea35118636bdc0c3dd4210
-
SSDEEP
1536:UQKOINQ8A4A3inaxLUPs9bfI86cT06POOoNQFMEX:UfrNQ8A4As6Ks9bf3dOfNg9X
Behavioral task
behavioral1
Sample
GTAGLagPatcher.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
GTAGLagPatcher.exe
Resource
win11-20240419-en
Malware Config
Extracted
xworm
127.0.0.1:33292
corporation-ver.gl.at.ply.gg:33292
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
GTAGLagPatcher.exe
-
Size
70KB
-
MD5
a465ea357cae35a66da7279a592e25c5
-
SHA1
fb20362c444ea4fbdc14597b78eee66c5b9c2a44
-
SHA256
fb74bd701a497dc3451d70bb8ed961303c6a6552fbcfc0c685015163748cdf12
-
SHA512
bc88851b92eb39cc22a41f1e6d6425fa061b8e1abdc8a9f0b51d76f67df38158fbc19872f9b2ccc4a50e090067a11f047bbf5b282dea35118636bdc0c3dd4210
-
SSDEEP
1536:UQKOINQ8A4A3inaxLUPs9bfI86cT06POOoNQFMEX:UfrNQ8A4As6Ks9bf3dOfNg9X
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-