General
-
Target
XCl11ient.exe
-
Size
198KB
-
Sample
240525-etscesea9w
-
MD5
ad23c3ed0a57035ec1e96821af565e9c
-
SHA1
bbb6a5195e6595bf0b0f9afcd0edcbd6da37204c
-
SHA256
99622679495f7f3e9ce02aaaa8a62d16ad385efe204f0d59059df0e51607dec5
-
SHA512
c2de4832bbcda8ef69213ed3d4a04ccecf2761208c8b918d5b6d8a401ed5566ac11486fb2dafe89daf167d6d940b4633cdfbbba09578dc6bca404931391cee7d
-
SSDEEP
3072:T0GuY3knJR+b5Pvcc+iewCDOwRk8RUGKXs+S++7KFSbxeY+qDDrMf:T0RsknibJvF5GqStKEbxI
Behavioral task
behavioral1
Sample
XCl11ient.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
XCl11ient.exe
-
Size
198KB
-
MD5
ad23c3ed0a57035ec1e96821af565e9c
-
SHA1
bbb6a5195e6595bf0b0f9afcd0edcbd6da37204c
-
SHA256
99622679495f7f3e9ce02aaaa8a62d16ad385efe204f0d59059df0e51607dec5
-
SHA512
c2de4832bbcda8ef69213ed3d4a04ccecf2761208c8b918d5b6d8a401ed5566ac11486fb2dafe89daf167d6d940b4633cdfbbba09578dc6bca404931391cee7d
-
SSDEEP
3072:T0GuY3knJR+b5Pvcc+iewCDOwRk8RUGKXs+S++7KFSbxeY+qDDrMf:T0RsknibJvF5GqStKEbxI
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-