General
-
Target
XClient.exe
-
Size
68KB
-
Sample
240604-nc76zseg75
-
MD5
fed56e9eed4cdf42e81e1802cfec7e58
-
SHA1
921c7b8400c3af3a103e2db0f2f416eb9a0ebc8a
-
SHA256
0b92df849995e13cc3453754325a9287d742d4672303412a3318e885482dd5b8
-
SHA512
294f2810a981dcf24d2d02dcb80533f4ac0f3bc2db73c6170415ab8ef7e6346681e423026c66cce0ed648bf40da263e1d6b41fcb556c29b881f77870e06b2eb7
-
SSDEEP
1536:NmYtC6gXBD8YdULOhNGX0+bvYIJA2628OVASvUn:NA6CBD8u2CGE+bv0u8OVJw
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
19.ip.gl.ply.gg:65468
speed-wheat.gl.at.ply.gg:65468
XWorm V5.2:123
-
Install_directory
%AppData%
-
install_file
Delta.exe
Targets
-
-
Target
XClient.exe
-
Size
68KB
-
MD5
fed56e9eed4cdf42e81e1802cfec7e58
-
SHA1
921c7b8400c3af3a103e2db0f2f416eb9a0ebc8a
-
SHA256
0b92df849995e13cc3453754325a9287d742d4672303412a3318e885482dd5b8
-
SHA512
294f2810a981dcf24d2d02dcb80533f4ac0f3bc2db73c6170415ab8ef7e6346681e423026c66cce0ed648bf40da263e1d6b41fcb556c29b881f77870e06b2eb7
-
SSDEEP
1536:NmYtC6gXBD8YdULOhNGX0+bvYIJA2628OVASvUn:NA6CBD8u2CGE+bv0u8OVJw
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-