General
-
Target
XClient.exe
-
Size
38KB
-
Sample
240712-dxcwgaygmc
-
MD5
40fd7f5d00604ab1cc3abf3125acce25
-
SHA1
7c5e873cdc6cc1441f35e3eb5359b90adf2b6312
-
SHA256
a43ffa9b770fee9756cb922845498e312a0c46db2bd050808c437f2015901a7c
-
SHA512
494b8492dedc35d27c42b5131c076c792ebdcf72514a540c9905edb4796e92ee8dc94f43dd8b8968c83128d0c6d2f31e7f3ee9ece6950935db165c08a8b1c4dc
-
SSDEEP
768:IKpWF9zkAoWaLtTxnbSXFyw9BHs1Ff6rO/hbPyEnlX:IKpWvQAozBbEFr91UFf6rO/xplX
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
xworm
5.0
t-protecting.gl.at.ply.gg:24735
1EuBk7bTbdnZc8s4
-
Install_directory
%AppData%
-
install_file
GtagCosmeticGiver.exe
Targets
-
-
Target
XClient.exe
-
Size
38KB
-
MD5
40fd7f5d00604ab1cc3abf3125acce25
-
SHA1
7c5e873cdc6cc1441f35e3eb5359b90adf2b6312
-
SHA256
a43ffa9b770fee9756cb922845498e312a0c46db2bd050808c437f2015901a7c
-
SHA512
494b8492dedc35d27c42b5131c076c792ebdcf72514a540c9905edb4796e92ee8dc94f43dd8b8968c83128d0c6d2f31e7f3ee9ece6950935db165c08a8b1c4dc
-
SSDEEP
768:IKpWF9zkAoWaLtTxnbSXFyw9BHs1Ff6rO/hbPyEnlX:IKpWvQAozBbEFr91UFf6rO/xplX
-
Detect Xworm Payload
-
StormKitty payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1