General
-
Target
XClient.bat
-
Size
273KB
-
Sample
240727-hq2ngashmj
-
MD5
dca82e50fdbefaf467663ee49541a5e8
-
SHA1
52bcb41f5b2566312c53dcc95348fc681a1b56e1
-
SHA256
1896c998055a7aa425a66bc860d7844102e9a303732df8f7eeb560d659e90c6f
-
SHA512
4e4e0749db357e911a6b9d4d3a6419df9bf03a70ea405eeb16f539f48bf202c75a91fb06ae29818fb276d61df3efbd1a1e5c5a3e41145d734c2d0764d7c0e538
-
SSDEEP
6144:DwT4eBwEaUe82AEsELrc/A5sj31o5Eh+rPTUeG8P0j5ZWCfc:DwTvCRtfs7AKjyEh+fUePP0Bc
Static task
static1
Behavioral task
behavioral1
Sample
XClient.bat
Resource
win7-20240704-en
Malware Config
Extracted
xworm
5.0
thus-coffee.gl.at.ply.gg:6886
OLM8W4YTLUQ9bDI1
-
install_file
USB.exe
Targets
-
-
Target
XClient.bat
-
Size
273KB
-
MD5
dca82e50fdbefaf467663ee49541a5e8
-
SHA1
52bcb41f5b2566312c53dcc95348fc681a1b56e1
-
SHA256
1896c998055a7aa425a66bc860d7844102e9a303732df8f7eeb560d659e90c6f
-
SHA512
4e4e0749db357e911a6b9d4d3a6419df9bf03a70ea405eeb16f539f48bf202c75a91fb06ae29818fb276d61df3efbd1a1e5c5a3e41145d734c2d0764d7c0e538
-
SSDEEP
6144:DwT4eBwEaUe82AEsELrc/A5sj31o5Eh+rPTUeG8P0j5ZWCfc:DwTvCRtfs7AKjyEh+fUePP0Bc
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-