General
-
Target
XClient.exe
-
Size
154KB
-
Sample
240521-kyly4aff4s
-
MD5
1f99269d8c8183235ff12ae3f4d2b4eb
-
SHA1
4d4b8327a136434a010b93c5fb271e2bde656c7b
-
SHA256
18bf0e7fcb5c8a95790abcbe04e91e959c78a3e5bf4a1382c32f31fd9b18ae5f
-
SHA512
02d7576110ec196e05697271b639d4d68b7851b3c3d2df2c4da3c444752c8bf9c913a43501bace032ac5ccfcef0f0c8f9560265b0f741070da882259e7e98e7f
-
SSDEEP
3072:e5zxHfo3aFI9euOwJ4NpVq8BxFRzaqF+o2GQJ7/JzqVfGvM:eX6cI99gVqwlL
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
5.0
RJO0uV5VF2w1hCbH
-
Install_directory
%AppData%
-
install_file
Chrome.exe
-
pastebin_url
https://pastebin.com/raw/zghRJSSE
Targets
-
-
Target
XClient.exe
-
Size
154KB
-
MD5
1f99269d8c8183235ff12ae3f4d2b4eb
-
SHA1
4d4b8327a136434a010b93c5fb271e2bde656c7b
-
SHA256
18bf0e7fcb5c8a95790abcbe04e91e959c78a3e5bf4a1382c32f31fd9b18ae5f
-
SHA512
02d7576110ec196e05697271b639d4d68b7851b3c3d2df2c4da3c444752c8bf9c913a43501bace032ac5ccfcef0f0c8f9560265b0f741070da882259e7e98e7f
-
SSDEEP
3072:e5zxHfo3aFI9euOwJ4NpVq8BxFRzaqF+o2GQJ7/JzqVfGvM:eX6cI99gVqwlL
Score10/10-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-