General
-
Target
XClient-protected.exe
-
Size
309KB
-
Sample
240520-c9e1xsgb24
-
MD5
61a9752c153144d46947b2764a098d72
-
SHA1
d477fd5bf2fdb1bc6f99b538687f75618c53c55f
-
SHA256
3793639df23de841f332d99a3ef1ff8212a0e0593d415896344b5e54ea1238b6
-
SHA512
eefe1ad6c60bd340db317c74d5cacc8ce2d9c53c3725d6ca7ea7c5bfefcdf0627a54749d31b6d8fc223cc0f08a7dfc0d2255c548954fc8b6e4fd39b28ef9cc38
-
SSDEEP
6144:gaWaSdnPm73wByB4zNl8FF/yybIiQXsaIkjRSkYQ:MaSZQ3wByBCNlRiQTjK
Static task
static1
Behavioral task
behavioral1
Sample
XClient-protected.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
XClient-protected.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
XClient-protected.exe
-
Size
309KB
-
MD5
61a9752c153144d46947b2764a098d72
-
SHA1
d477fd5bf2fdb1bc6f99b538687f75618c53c55f
-
SHA256
3793639df23de841f332d99a3ef1ff8212a0e0593d415896344b5e54ea1238b6
-
SHA512
eefe1ad6c60bd340db317c74d5cacc8ce2d9c53c3725d6ca7ea7c5bfefcdf0627a54749d31b6d8fc223cc0f08a7dfc0d2255c548954fc8b6e4fd39b28ef9cc38
-
SSDEEP
6144:gaWaSdnPm73wByB4zNl8FF/yybIiQXsaIkjRSkYQ:MaSZQ3wByBCNlRiQTjK
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-