General
-
Target
XClient.exe
-
Size
69KB
-
Sample
240901-l25q2sxerm
-
MD5
7fa99ccbea8ecaf80ed87ebdb44c17dd
-
SHA1
e2f29018810fbf56a5e475a187d749f3adbbc0a7
-
SHA256
48d709a89f1ede2666185789ae0747f90139d7d46687d05cb6d17e45a3fea965
-
SHA512
39165c4fc25403823d124e43022ca8fa78e643204885024ff9c0f96b9d3f021ec44287f5080b7115e68e8c254627660512d2430e4e68bbe6b778607e7f4a9d83
-
SSDEEP
1536:yc52LJ8cdIA01NxTZ6BYjmzJibJ+bQzAxAS91mb6uLO1X5g:d5WJpb0NTABXzk+bQzE+LO1Xu
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
brands-colors.gl.at.ply.gg:28379
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
Targets
-
-
Target
XClient.exe
-
Size
69KB
-
MD5
7fa99ccbea8ecaf80ed87ebdb44c17dd
-
SHA1
e2f29018810fbf56a5e475a187d749f3adbbc0a7
-
SHA256
48d709a89f1ede2666185789ae0747f90139d7d46687d05cb6d17e45a3fea965
-
SHA512
39165c4fc25403823d124e43022ca8fa78e643204885024ff9c0f96b9d3f021ec44287f5080b7115e68e8c254627660512d2430e4e68bbe6b778607e7f4a9d83
-
SSDEEP
1536:yc52LJ8cdIA01NxTZ6BYjmzJibJ+bQzAxAS91mb6uLO1X5g:d5WJpb0NTABXzk+bQzE+LO1Xu
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1