General
-
Target
XClient.exe
-
Size
63KB
-
Sample
240608-m6f4xsba4z
-
MD5
771eeac6ba18a3ce81c5ccb3ecb54bb3
-
SHA1
85148f90d8c62ea98acd69bdbc574ee609d93d22
-
SHA256
833731cce3a2960ff61cb354f003570e2e14a059c1e259a4c0be7a716767d7dd
-
SHA512
8a8fee68af11a3cdcd2b3be8be76c9eb31b7c816dbb5c9f87a3cfc041c6241c4b62a03c4872a8805f1c30522febd68c299f9f5325317d4c0e57e07ab0b27b043
-
SSDEEP
1536:yt29HwwrKua7WvS3btT+bb0ts3+3G6wVO+QTr1ww2:yKHwwr1i3hT+bben3oVO+Qf1P2
Malware Config
Extracted
xworm
192.168.56.1:7000
-
install_file
USB.exe
Targets
-
-
Target
XClient.exe
-
Size
63KB
-
MD5
771eeac6ba18a3ce81c5ccb3ecb54bb3
-
SHA1
85148f90d8c62ea98acd69bdbc574ee609d93d22
-
SHA256
833731cce3a2960ff61cb354f003570e2e14a059c1e259a4c0be7a716767d7dd
-
SHA512
8a8fee68af11a3cdcd2b3be8be76c9eb31b7c816dbb5c9f87a3cfc041c6241c4b62a03c4872a8805f1c30522febd68c299f9f5325317d4c0e57e07ab0b27b043
-
SSDEEP
1536:yt29HwwrKua7WvS3btT+bb0ts3+3G6wVO+QTr1ww2:yKHwwr1i3hT+bben3oVO+Qf1P2
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-