General
-
Target
XClient.exe
-
Size
69KB
-
Sample
240602-pynj5sde88
-
MD5
4f035ef4de3102e56d73a1e5bc0133ce
-
SHA1
f9a6464bec36e6171ca140fb0b9ba97a9dab6afe
-
SHA256
5eff5c5de41bfde202b7f8c545330b42a3b6b3b51df8abd66c06823a0404d9e6
-
SHA512
e3235deaf69c9b806b0df6d17cdd6987ceb25e96ee51358173e8c836eff06ab8637eab07b49b3b323c5d6b97b8a194d176f5dff3a131cebe74176b39e5fd1dec
-
SSDEEP
1536:R1TbxvCM8IIEQlpGzFt6LnXvb32CxMyLMUv12tOsVyCMnV:jTlB8IxcpGJt6zfb3221v12tOsVyjV
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
XClient.exe
Resource
win11-20240426-en
Malware Config
Extracted
xworm
3.1
193.161.193.99 :44548
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Targets
-
-
Target
XClient.exe
-
Size
69KB
-
MD5
4f035ef4de3102e56d73a1e5bc0133ce
-
SHA1
f9a6464bec36e6171ca140fb0b9ba97a9dab6afe
-
SHA256
5eff5c5de41bfde202b7f8c545330b42a3b6b3b51df8abd66c06823a0404d9e6
-
SHA512
e3235deaf69c9b806b0df6d17cdd6987ceb25e96ee51358173e8c836eff06ab8637eab07b49b3b323c5d6b97b8a194d176f5dff3a131cebe74176b39e5fd1dec
-
SSDEEP
1536:R1TbxvCM8IIEQlpGzFt6LnXvb32CxMyLMUv12tOsVyCMnV:jTlB8IxcpGJt6zfb3221v12tOsVyjV
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-