General

  • Target

    XClient-protected.exe

  • Size

    309KB

  • Sample

    240520-c9e1xsgb24

  • MD5

    61a9752c153144d46947b2764a098d72

  • SHA1

    d477fd5bf2fdb1bc6f99b538687f75618c53c55f

  • SHA256

    3793639df23de841f332d99a3ef1ff8212a0e0593d415896344b5e54ea1238b6

  • SHA512

    eefe1ad6c60bd340db317c74d5cacc8ce2d9c53c3725d6ca7ea7c5bfefcdf0627a54749d31b6d8fc223cc0f08a7dfc0d2255c548954fc8b6e4fd39b28ef9cc38

  • SSDEEP

    6144:gaWaSdnPm73wByB4zNl8FF/yybIiQXsaIkjRSkYQ:MaSZQ3wByBCNlRiQTjK

Malware Config

Targets

    • Target

      XClient-protected.exe

    • Size

      309KB

    • MD5

      61a9752c153144d46947b2764a098d72

    • SHA1

      d477fd5bf2fdb1bc6f99b538687f75618c53c55f

    • SHA256

      3793639df23de841f332d99a3ef1ff8212a0e0593d415896344b5e54ea1238b6

    • SHA512

      eefe1ad6c60bd340db317c74d5cacc8ce2d9c53c3725d6ca7ea7c5bfefcdf0627a54749d31b6d8fc223cc0f08a7dfc0d2255c548954fc8b6e4fd39b28ef9cc38

    • SSDEEP

      6144:gaWaSdnPm73wByB4zNl8FF/yybIiQXsaIkjRSkYQ:MaSZQ3wByBCNlRiQTjK

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks