General
-
Target
XRATClient.exe
-
Size
354KB
-
Sample
240921-xla3aaxglh
-
MD5
561def00a7bcf0e79729aaa63a0ca655
-
SHA1
a0490d9a12b0e125889b11ab6880a75b9f56cf1b
-
SHA256
6fa4e5b526be2acf1ea59d961cf62590c1e438745b0cd9180c45e86a4d637ae1
-
SHA512
d9f1909080e51acb48f3dd724343c4721ea891e54e46d8e5fe5f390112d8f4f96c9455c9347be24d4f6c94c03dd6c6d549be5ccafbc0d2db98a50ef2589ff525
-
SSDEEP
3072:TcKLbgaYXPPfUvubWxU5ImSO2qqk4dGR:Tc5a238mb
Behavioral task
behavioral1
Sample
XRATClient.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
germany-notice.gl.at.ply.gg:54909
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
XRATClient.exe
-
Size
354KB
-
MD5
561def00a7bcf0e79729aaa63a0ca655
-
SHA1
a0490d9a12b0e125889b11ab6880a75b9f56cf1b
-
SHA256
6fa4e5b526be2acf1ea59d961cf62590c1e438745b0cd9180c45e86a4d637ae1
-
SHA512
d9f1909080e51acb48f3dd724343c4721ea891e54e46d8e5fe5f390112d8f4f96c9455c9347be24d4f6c94c03dd6c6d549be5ccafbc0d2db98a50ef2589ff525
-
SSDEEP
3072:TcKLbgaYXPPfUvubWxU5ImSO2qqk4dGR:Tc5a238mb
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Disables RegEdit via registry modification
-
Modifies Windows Firewall
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1