General
-
Target
XClient2.exe
-
Size
82KB
-
Sample
240805-vtvqjswgjb
-
MD5
04bfb56e7cfe27e2fb1dc4be72b705f5
-
SHA1
324e46eb02a4561536d9f5775e84592b85fd0f22
-
SHA256
6b0c02766fe5cce2ba045b22a4d22e1be715f36de87bcf37aef6819c9c2acc6d
-
SHA512
c80df99774f899f48b0150a32b86ba7c60337c99bbe6f60f57c8a7963fb50ce7c2259dd171353257abe21bce94e2ed33b2860ba60e0cc677519defc4e08e2015
-
SSDEEP
1536:cajDKkkG+Ng/rhqNGqdQAbmnGTDxE6S+Fj1ypOFEgLAMB/ddK:Rd1+ejloQAbmGTtypOKuBDK
Behavioral task
behavioral1
Sample
XClient2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
XClient2.exe
Resource
win11-20240802-en
Malware Config
Extracted
xworm
127.0.0.1:48534
localhost:48534
domain-vote.gl.at.ply.gg:48534
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
XClient2.exe
-
Size
82KB
-
MD5
04bfb56e7cfe27e2fb1dc4be72b705f5
-
SHA1
324e46eb02a4561536d9f5775e84592b85fd0f22
-
SHA256
6b0c02766fe5cce2ba045b22a4d22e1be715f36de87bcf37aef6819c9c2acc6d
-
SHA512
c80df99774f899f48b0150a32b86ba7c60337c99bbe6f60f57c8a7963fb50ce7c2259dd171353257abe21bce94e2ed33b2860ba60e0cc677519defc4e08e2015
-
SSDEEP
1536:cajDKkkG+Ng/rhqNGqdQAbmnGTDxE6S+Fj1ypOFEgLAMB/ddK:Rd1+ejloQAbmGTtypOKuBDK
-
Detect Xworm Payload
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1