General
-
Target
XClient.exe
-
Size
72KB
-
Sample
240531-jz262acg88
-
MD5
dab9e10b713779e5a811a1c89ae6252a
-
SHA1
fea8c8140c6b13fabdb258acb3a646c1a54e36be
-
SHA256
e712b1e3a9313d86fce1ca310401f88e8fcda3c2b65ff9633613018bac09012f
-
SHA512
ad6f6b0a0b1ce606964e1fa1ddd3ccef30fa2f90b1af3e57108b7a30aeb43aa02e64b407b519e1463597f4147f639eb1d09d4c0717127da8700d2998929b03fe
-
SSDEEP
1536:XdqJfIiYkjEj1xFhI6mX1EgjbDhcb6rOFw2Uy:SlYJBjXkNjbDXOFwHy
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
isbn-employee.gl.at.ply.gg:4328
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
XClient.exe
-
Size
72KB
-
MD5
dab9e10b713779e5a811a1c89ae6252a
-
SHA1
fea8c8140c6b13fabdb258acb3a646c1a54e36be
-
SHA256
e712b1e3a9313d86fce1ca310401f88e8fcda3c2b65ff9633613018bac09012f
-
SHA512
ad6f6b0a0b1ce606964e1fa1ddd3ccef30fa2f90b1af3e57108b7a30aeb43aa02e64b407b519e1463597f4147f639eb1d09d4c0717127da8700d2998929b03fe
-
SSDEEP
1536:XdqJfIiYkjEj1xFhI6mX1EgjbDhcb6rOFw2Uy:SlYJBjXkNjbDXOFwHy
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-