General
-
Target
XClient.exe
-
Size
45KB
-
Sample
240615-fl3c4azblb
-
MD5
1ea7fa570588a032058606fb7e020a3b
-
SHA1
e65850b6abc138b93a9810ae03d20ff3109a52cc
-
SHA256
daafb00382eccadaf2f91f5cdf9495db9f3c7245aebe3905bb4637909c58a2e0
-
SHA512
e952652c2385e39d670b68aa14be28a04687b1bf036af116be7310eb1af0e6a9bbc3990803f109d145e79c37d2f043d98b60f23b5affdd29555caae193fb5e95
-
SSDEEP
768:YaQmwcZlyOArAloVIpfVrzPmFEPa9BbkR6cOFhVzwtE/:NwGl3VfliFd9x86cOFPX/
Malware Config
Extracted
xworm
5.0
DSLw1tuN6TXiQSJh
-
Install_directory
%ProgramData%
-
install_file
rundll64.exe
-
pastebin_url
https://pastebin.com/raw/EiiXCJbn
Targets
-
-
Target
XClient.exe
-
Size
45KB
-
MD5
1ea7fa570588a032058606fb7e020a3b
-
SHA1
e65850b6abc138b93a9810ae03d20ff3109a52cc
-
SHA256
daafb00382eccadaf2f91f5cdf9495db9f3c7245aebe3905bb4637909c58a2e0
-
SHA512
e952652c2385e39d670b68aa14be28a04687b1bf036af116be7310eb1af0e6a9bbc3990803f109d145e79c37d2f043d98b60f23b5affdd29555caae193fb5e95
-
SSDEEP
768:YaQmwcZlyOArAloVIpfVrzPmFEPa9BbkR6cOFhVzwtE/:NwGl3VfliFd9x86cOFPX/
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-