General
-
Target
XClient.bat
-
Size
146KB
-
Sample
241015-cykr2azcnd
-
MD5
c25139a288ac9288c141258006a3b30b
-
SHA1
ba64fb572fb89cd3a8d93c7cce012c5042970157
-
SHA256
2f425120671f4acb946275ebc731bf7b34a5c85f3d235ce9aa7f7b44994d09e4
-
SHA512
40b6011d8663f9c1c04ec0f60d11d7fb92785a064a5346bfd9ce1d669e12392557590435c9dd5d36b7be0846225117efc1bb19235b078ffa19ec8decf0fe61cd
-
SSDEEP
1536:Uh7jbS9f7cL5YUkoKjxClNmwTZAp7zVxg:UhOR7cL5YUkoKjxCdTZAp7zVxg
Static task
static1
Behavioral task
behavioral1
Sample
XClient.bat
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
customer-principle.gl.at.ply.gg:22759
bOqwY0aI6b39j66G
-
Install_directory
%Public%
-
install_file
XClient.exe
Targets
-
-
Target
XClient.bat
-
Size
146KB
-
MD5
c25139a288ac9288c141258006a3b30b
-
SHA1
ba64fb572fb89cd3a8d93c7cce012c5042970157
-
SHA256
2f425120671f4acb946275ebc731bf7b34a5c85f3d235ce9aa7f7b44994d09e4
-
SHA512
40b6011d8663f9c1c04ec0f60d11d7fb92785a064a5346bfd9ce1d669e12392557590435c9dd5d36b7be0846225117efc1bb19235b078ffa19ec8decf0fe61cd
-
SSDEEP
1536:Uh7jbS9f7cL5YUkoKjxClNmwTZAp7zVxg:UhOR7cL5YUkoKjxCdTZAp7zVxg
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-