General
-
Target
XClient.exe
-
Size
34KB
-
Sample
240921-va915ashql
-
MD5
17e7008acdf564a64c66b5e1551de7d1
-
SHA1
89b9db120317d212ade05c2c300fe461d324d1a0
-
SHA256
1a875a261fd81412ed0bc0dd53084dd6e9b7a5545802a1c37d85efeb3ec314bd
-
SHA512
f4eb1e7c9997e3e9714e455b097081e52e3af72e5017c5ee2ab34c0cefcf197183f75f7a31870319ac24f36696778885f01d94accd3b5b866dbc20a406c36735
-
SSDEEP
768:pXuuB5cBenG5Z96pbWx9FV9jJOjhj/4e:pXu25cBeGjspW/FV9jJOjZQe
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240708-en
Malware Config
Extracted
xworm
5.0
lefferek-42016.portmap.host:42016
CvqERIOnQqEv3r1K
-
Install_directory
%AppData%
-
install_file
DiscordClient.exe
Targets
-
-
Target
XClient.exe
-
Size
34KB
-
MD5
17e7008acdf564a64c66b5e1551de7d1
-
SHA1
89b9db120317d212ade05c2c300fe461d324d1a0
-
SHA256
1a875a261fd81412ed0bc0dd53084dd6e9b7a5545802a1c37d85efeb3ec314bd
-
SHA512
f4eb1e7c9997e3e9714e455b097081e52e3af72e5017c5ee2ab34c0cefcf197183f75f7a31870319ac24f36696778885f01d94accd3b5b866dbc20a406c36735
-
SSDEEP
768:pXuuB5cBenG5Z96pbWx9FV9jJOjhj/4e:pXu25cBeGjspW/FV9jJOjZQe
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1