General
-
Target
aimwhere_steam_module.exe
-
Size
78KB
-
Sample
240530-myj6lseg4t
-
MD5
f200833ce65e1dc078cec47227c0fd19
-
SHA1
6676c2ab005e976245f646e9d8255f383b9d8a74
-
SHA256
8e81cad20a55301586d986a1d15c9e822f807453e1dec2e9a5c82af59167a8f7
-
SHA512
3c3588671d53b0d316fd4460915466686ca083bba69cba165f55da49f9e1f94c1d89c3041a3d71c5cc66a78144f26c20554d8878c8bc43c6f4b10f2beea057dd
-
SSDEEP
1536:Ma7N2sxomcA2cfcCsPruA6mvFNHbw78jl0ZQ0h1m6m3rcMOl4KJ:4LcECKrupkjbwgMQ0SXOiO
Behavioral task
behavioral1
Sample
aimwhere_steam_module.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
xworm
127.0.0.1:4040
-
Install_directory
%Temp%
-
install_file
XClient.exe
Targets
-
-
Target
aimwhere_steam_module.exe
-
Size
78KB
-
MD5
f200833ce65e1dc078cec47227c0fd19
-
SHA1
6676c2ab005e976245f646e9d8255f383b9d8a74
-
SHA256
8e81cad20a55301586d986a1d15c9e822f807453e1dec2e9a5c82af59167a8f7
-
SHA512
3c3588671d53b0d316fd4460915466686ca083bba69cba165f55da49f9e1f94c1d89c3041a3d71c5cc66a78144f26c20554d8878c8bc43c6f4b10f2beea057dd
-
SSDEEP
1536:Ma7N2sxomcA2cfcCsPruA6mvFNHbw78jl0ZQ0h1m6m3rcMOl4KJ:4LcECKrupkjbwgMQ0SXOiO
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-