General
-
Target
XClient.exe
-
Size
34KB
-
Sample
240723-xrmy2ashrj
-
MD5
8bb9d79ea292fc23e600ebd7957e9333
-
SHA1
4e78c73a5383f14edc669260524da4bdd5130c36
-
SHA256
12631c9b83e06b20eb1727eff06e2d6e264e8c58d62ea6ee5d351d195af3502a
-
SHA512
35101121210917d2dfd34e48f1b29e8806637b58cd18a0bbf93da1ee6decfac12ce55c0820e22c691287c7572bcdba69fc5d134ba4834c015aa553250d6383d8
-
SSDEEP
384:+xYQVyqLSxEe4fIETsI5feQjFptmByujICLYFiiXmv50QAXnxF8QFhk58pkFyHBp:yrvaUuYsIQehkVFyr9eWTOjhmSDc
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
XClient.exe
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
XClient.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
XClient.exe
Resource
win11-20240709-en
Malware Config
Extracted
xworm
5.0
insurance-helmet.gl.at.ply.gg:31388
wbZwsAW8h4Ee9jvd
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6758433214:AAHsOKdFy4qDz6vRHO6UQUpRG85G-wZvC1Y/sendMessage?chat_id=6234857847
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
XClient.exe
-
Size
34KB
-
MD5
8bb9d79ea292fc23e600ebd7957e9333
-
SHA1
4e78c73a5383f14edc669260524da4bdd5130c36
-
SHA256
12631c9b83e06b20eb1727eff06e2d6e264e8c58d62ea6ee5d351d195af3502a
-
SHA512
35101121210917d2dfd34e48f1b29e8806637b58cd18a0bbf93da1ee6decfac12ce55c0820e22c691287c7572bcdba69fc5d134ba4834c015aa553250d6383d8
-
SSDEEP
384:+xYQVyqLSxEe4fIETsI5feQjFptmByujICLYFiiXmv50QAXnxF8QFhk58pkFyHBp:yrvaUuYsIQehkVFyr9eWTOjhmSDc
-
Detect Xworm Payload
-
Modifies WinLogon for persistence
-
StormKitty payload
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1