General
-
Target
XClient.exe
-
Size
44KB
-
Sample
240615-fc7w8ayhnc
-
MD5
6e9fa2861d7787e72a110992f2484f1c
-
SHA1
6a893005fc8aa7a30cdad0cbd8d1267d3552241b
-
SHA256
e1e8b20e65ab2bf8984257349caae81261ed4707d92c1246d233f99ac5c38f7c
-
SHA512
48ceeb53234aeb4e511f3eacd2642b7735eb27403426fceabb81c3e484d5bcd584b715b36921a96efae95e5b5c3b1f88804be7d3313642873f6f9d494cca98eb
-
SSDEEP
768:d2aZQnlm1k5nVAhEIkfVr9PDDmFEPa9Bfk6tOFhszwtwN:dKlRpflMFd9Nk6tOFmnN
Malware Config
Extracted
xworm
5.0
bKfNZmtdOSnSkNdE
-
Install_directory
%LocalAppData%
-
install_file
rundll64.exe
Targets
-
-
Target
XClient.exe
-
Size
44KB
-
MD5
6e9fa2861d7787e72a110992f2484f1c
-
SHA1
6a893005fc8aa7a30cdad0cbd8d1267d3552241b
-
SHA256
e1e8b20e65ab2bf8984257349caae81261ed4707d92c1246d233f99ac5c38f7c
-
SHA512
48ceeb53234aeb4e511f3eacd2642b7735eb27403426fceabb81c3e484d5bcd584b715b36921a96efae95e5b5c3b1f88804be7d3313642873f6f9d494cca98eb
-
SSDEEP
768:d2aZQnlm1k5nVAhEIkfVr9PDDmFEPa9Bfk6tOFhszwtwN:dKlRpflMFd9Nk6tOFmnN
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-