General
-
Target
XClient_2.rar
-
Size
39KB
-
Sample
240607-1xefmadc5w
-
MD5
bb408af659e235e1d7f4efb840273cc6
-
SHA1
8b96cfe7a4716d1c38e8e99f3c2bb9b015b5eb83
-
SHA256
2d0547f08aef302a993f8b9f0f7053302197f1dc7ace3c98eb38c7a56ab28b33
-
SHA512
d6bb9a4cd36f18462485e7dd085dc3330871a212760af65f9c988f6ea851ed8925055b8ae155f4b68c5fdfeeff1f5a8e03c368662ceb8bd4eb26b6dac983290d
-
SSDEEP
768:VJ26bR4GPzBfRbAC2D6O/P0Nj4m7j8hCSg/5lUHvLIeo3:VjJrACc6O/P0NTf80/lUHDtW
Static task
static1
Behavioral task
behavioral1
Sample
XClient_2.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
XClient_2.rar
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
regular-engineers.gl.at.ply.gg:14550
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
XClient_2.rar
-
Size
39KB
-
MD5
bb408af659e235e1d7f4efb840273cc6
-
SHA1
8b96cfe7a4716d1c38e8e99f3c2bb9b015b5eb83
-
SHA256
2d0547f08aef302a993f8b9f0f7053302197f1dc7ace3c98eb38c7a56ab28b33
-
SHA512
d6bb9a4cd36f18462485e7dd085dc3330871a212760af65f9c988f6ea851ed8925055b8ae155f4b68c5fdfeeff1f5a8e03c368662ceb8bd4eb26b6dac983290d
-
SSDEEP
768:VJ26bR4GPzBfRbAC2D6O/P0Nj4m7j8hCSg/5lUHvLIeo3:VjJrACc6O/P0NTf80/lUHDtW
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-