Analysis
-
max time kernel
62s -
max time network
67s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
03-11-2024 20:23
General
-
Target
XClient.exe
-
Size
36KB
-
MD5
76abc5eee266baab28bed67c7b6b9f5b
-
SHA1
4314935d1cc93032cec978a80bcd4437c35520dd
-
SHA256
e10d23d5da319f888ea91736129672e90445b935c62dbc945dd1d22b88a78e24
-
SHA512
dec42cda9f35d322365d92e8c36a2c1735d8a957a1a061ca74fb8364b186ff29330c5dff10b49d1cc2cda453c2232ca296a8321840acd737ceb5a58abf8d92c3
-
SSDEEP
768:8T1ZDbYFdqCoYa+QRz7pudDxZEQy1UrILFyW9fsmOjhRPya:GZ4RZQR/2rTiU+Fv9ftOjPz
Malware Config
Extracted
Family
xworm
Version
5.0
C2
147.185.221.21:27469
Mutex
w9KNWkqQKRSrP7eA
Attributes
-
Install_directory
%Temp%
-
install_file
System.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/4620-1-0x00000000006E0000-0x00000000006F0000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4620 XClient.exe