General
-
Target
222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe
-
Size
205KB
-
Sample
240914-bkxn1aygnr
-
MD5
f66d550297b5c67560fcdfef40b9bf5e
-
SHA1
9ea877d3063ed6f9f381b74e0fc71b9e72b52929
-
SHA256
222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6
-
SHA512
8247e3a890163c6fddec7dc8bfb420c51cfa6aa5863203f733ad34b611f598c92d6e9405af64ade3fe8149dca55c1504071677b7dbd3c5b57f19a61f43f0ab0d
-
SSDEEP
3072:ff05a/CTR9hFc9UxOMh8SKfbzxcwg7es6/Vsb8VKTup49oJMfF/H9N3Ky9NzLnF:WR9Hc9wUhcX7elbKTuq9bfF/H9d9n
Behavioral task
behavioral1
Sample
222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe
Resource
win7-20240729-en
Malware Config
Extracted
xworm
5.0
147.50.240.203:7000
X0ZQBFW2mJiaVxWi
-
Install_directory
%ProgramData%
-
install_file
XClient.exe
Targets
-
-
Target
222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6.exe
-
Size
205KB
-
MD5
f66d550297b5c67560fcdfef40b9bf5e
-
SHA1
9ea877d3063ed6f9f381b74e0fc71b9e72b52929
-
SHA256
222f76224b428d25c8a16437f9d05309ea160816439f25dd5e5003b07ef294a6
-
SHA512
8247e3a890163c6fddec7dc8bfb420c51cfa6aa5863203f733ad34b611f598c92d6e9405af64ade3fe8149dca55c1504071677b7dbd3c5b57f19a61f43f0ab0d
-
SSDEEP
3072:ff05a/CTR9hFc9UxOMh8SKfbzxcwg7es6/Vsb8VKTup49oJMfF/H9N3Ky9NzLnF:WR9Hc9wUhcX7elbKTuq9bfF/H9d9n
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-