General
-
Target
1f002be3e2c89853aab023bcfac564bf6a2f0fe4d3ff936444594964413b6fba.exe
-
Size
170KB
-
Sample
240823-bkpcmaxerh
-
MD5
a805c895c507a30f12e39e04f55a7bf1
-
SHA1
1871cc40e2c48397f54d96d6be8fe07c0b615fa1
-
SHA256
1f002be3e2c89853aab023bcfac564bf6a2f0fe4d3ff936444594964413b6fba
-
SHA512
5b1b85a835c0d2f5253e2d421541344b1798365a8f25131f73b12df578958b257ab89d602ebff8974750dd76cf2fe5195ef9da6f7f017f180927f771121c02e1
-
SSDEEP
3072:T7FTPCDwNXHwR8bOH9yE8OB7SnFTM+lmsolAIrRuw+mqv9j1MWLQM:T7FTaDwRk8b09N/7S4+lDAA
Behavioral task
behavioral1
Sample
1f002be3e2c89853aab023bcfac564bf6a2f0fe4d3ff936444594964413b6fba.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1f002be3e2c89853aab023bcfac564bf6a2f0fe4d3ff936444594964413b6fba.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
127.0.0.1:1234
143.198.208.124:1234
-
Install_directory
%Temp%
-
install_file
XClient.exe
Targets
-
-
Target
1f002be3e2c89853aab023bcfac564bf6a2f0fe4d3ff936444594964413b6fba.exe
-
Size
170KB
-
MD5
a805c895c507a30f12e39e04f55a7bf1
-
SHA1
1871cc40e2c48397f54d96d6be8fe07c0b615fa1
-
SHA256
1f002be3e2c89853aab023bcfac564bf6a2f0fe4d3ff936444594964413b6fba
-
SHA512
5b1b85a835c0d2f5253e2d421541344b1798365a8f25131f73b12df578958b257ab89d602ebff8974750dd76cf2fe5195ef9da6f7f017f180927f771121c02e1
-
SSDEEP
3072:T7FTPCDwNXHwR8bOH9yE8OB7SnFTM+lmsolAIrRuw+mqv9j1MWLQM:T7FTaDwRk8b09N/7S4+lDAA
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1