Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31/10/2024, 22:09
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
XClient.exe
-
Size
36KB
-
MD5
2bcaac0408a66804c92255b231540132
-
SHA1
7787035daebedbd174ed0867c52a04c2c0794bda
-
SHA256
2af059555b94c55a54b75d34807f0d84298fc4f816b1dcd6e54bbbe3406572ea
-
SHA512
ed1f1dafe97e61ff271561796c264a9a35bb64b9ac8bce0c1962a19604ea4b48c70ff453ea992a889439555394f886100eb89b93f12b8ec3c628f04584527694
-
SSDEEP
768:KMTd+k/0haPBLwp21GxZEQy1Ur/LFyW9fFOjhjPyw:KO+K0hCBUGYTiUHFv9fFOjFB
Malware Config
Extracted
Family
xworm
Version
5.0
C2
ensure-manual.gl.at.ply.gg:41199
Mutex
7lRLtbPztj7FrVA5
Attributes
-
Install_directory
%AppData%
-
install_file
dllhost.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2124-1-0x0000000001100000-0x0000000001110000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2124 XClient.exe