General
-
Target
XClient.exe
-
Size
81KB
-
Sample
240521-nxcwksce56
-
MD5
c6ffac22c66a74b54db0b68ee74f89f8
-
SHA1
b92762dcc83f5c1fc93930f9319ed7817ee3358d
-
SHA256
aa83740e4e4300a89a86b14491f3a567ba4ed498b016855fa21871795029ff8d
-
SHA512
50aa41fd3da84cb488cb697f72013106ff98035fe1d78f293bde59e296d06c3456c8979fb335f6d760081a4850d6c4b70de0ba543391a9e636be43561a46cca2
-
SSDEEP
1536:c3xKcyVhF1H97YBpb1/KkH9VlGxGZ5d6qKA2jOSKfd2l:c3xolHxoblKkHJGxqd32jOSKf0
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
xworm
values-painted.gl.at.ply.gg:12784
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
XClient.exe
-
Size
81KB
-
MD5
c6ffac22c66a74b54db0b68ee74f89f8
-
SHA1
b92762dcc83f5c1fc93930f9319ed7817ee3358d
-
SHA256
aa83740e4e4300a89a86b14491f3a567ba4ed498b016855fa21871795029ff8d
-
SHA512
50aa41fd3da84cb488cb697f72013106ff98035fe1d78f293bde59e296d06c3456c8979fb335f6d760081a4850d6c4b70de0ba543391a9e636be43561a46cca2
-
SSDEEP
1536:c3xKcyVhF1H97YBpb1/KkH9VlGxGZ5d6qKA2jOSKfd2l:c3xolHxoblKkHJGxqd32jOSKf0
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-