General
-
Target
XClient.scr
-
Size
71KB
-
Sample
240820-zkg6bawfjl
-
MD5
5513183baf417b3a7190752a82b208b8
-
SHA1
f8b8462561ee345d02ce68b0faa279ffabb8a4b0
-
SHA256
799a78dff2f087686b22635366263dcc9bf4d1daf620ae0118bf90088e87a6f2
-
SHA512
cdea1aff72f627e22fd2b135ae9de4108caa35b49ff88b57a9ca9204f31e16fa05b69651d3953ebc054d8bca4c84db6fadccdc80b3a4e19aa1d600ab360178b1
-
SSDEEP
768:bMa8JQRkmIoU8LFwukRtg5JU2mB4UQV99gFaBPB9vq2TnbE5nX+bvB7Pn+jdUeML:MuRnIApwUoun9bER+bvp+Fm6K1OLPSF
Behavioral task
behavioral1
Sample
XClient.scr
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
XClient.scr
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
dead-he.gl.at.ply.gg:57200
-
Install_directory
%Public%
-
install_file
X.exe
Targets
-
-
Target
XClient.scr
-
Size
71KB
-
MD5
5513183baf417b3a7190752a82b208b8
-
SHA1
f8b8462561ee345d02ce68b0faa279ffabb8a4b0
-
SHA256
799a78dff2f087686b22635366263dcc9bf4d1daf620ae0118bf90088e87a6f2
-
SHA512
cdea1aff72f627e22fd2b135ae9de4108caa35b49ff88b57a9ca9204f31e16fa05b69651d3953ebc054d8bca4c84db6fadccdc80b3a4e19aa1d600ab360178b1
-
SSDEEP
768:bMa8JQRkmIoU8LFwukRtg5JU2mB4UQV99gFaBPB9vq2TnbE5nX+bvB7Pn+jdUeML:MuRnIApwUoun9bER+bvp+Fm6K1OLPSF
-
Detect Xworm Payload
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1