General
-
Target
XClient.exe
-
Size
45KB
-
Sample
240905-2askeascpf
-
MD5
e3af029077412f02acd6daecf132664b
-
SHA1
0804c6edd59cdb3663734a1a12a219d721af65d1
-
SHA256
d51f920fd25c8bbf37615c8eb5f7799722fb7532c5a0cc5199e85dbc972e9d15
-
SHA512
412d4babd911ebf061e984b1662c68b20add037ef3ad0da7dcfca17b153219023b225d4fbc58f114708ba21d0dd5279d875c32226f8b89dea936ccb85a850dbc
-
SSDEEP
768:CPLSrMoisb1QUhjKNcNclhlGRDXDgVdD7abFEPt9ObC6BOuh2zj5f:COyABKaavlmmdDwFY9UC6BOuYF
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win11-20240802-en
Malware Config
Extracted
xworm
5.0
http://item-suggesting.gl.at.ply.gg:36583
huB65wZdRpxXigoz
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
XClient.exe
-
Size
45KB
-
MD5
e3af029077412f02acd6daecf132664b
-
SHA1
0804c6edd59cdb3663734a1a12a219d721af65d1
-
SHA256
d51f920fd25c8bbf37615c8eb5f7799722fb7532c5a0cc5199e85dbc972e9d15
-
SHA512
412d4babd911ebf061e984b1662c68b20add037ef3ad0da7dcfca17b153219023b225d4fbc58f114708ba21d0dd5279d875c32226f8b89dea936ccb85a850dbc
-
SSDEEP
768:CPLSrMoisb1QUhjKNcNclhlGRDXDgVdD7abFEPt9ObC6BOuh2zj5f:COyABKaavlmmdDwFY9UC6BOuYF
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-