General
-
Target
XClient.bin.zip
-
Size
49KB
-
Sample
241105-qrffma1mcz
-
MD5
22845cfe6b09dc702464b0ed49aa2a92
-
SHA1
312fea82c599938e0830e7acedb915992641a2de
-
SHA256
5232f0ce645122b6dc2b7ca1cc4ac861560c7882a566d021c29293f36eab939b
-
SHA512
d2fe919b807f80d91a7999affb964890f192e44a798091af3c641e56aff28588fec45879e99ecf0ae3543d09b2b9c2dafac6ca76116e90e341e370e5c53fab25
-
SSDEEP
1536:XHAxtTNwRY64RScwD3ukvkhAA42oD88FKhG0FWd:XcmYxw6k+AA42UvFKcgu
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
3.1
152.67.162.194:10001
-
Install_directory
%ProgramData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6250773381:AAH64g12buc-51fqITw2Asa_4dMEvEQn-7g/sendMessage?chat_id=749417294
Targets
-
-
Target
XClient.bin
-
Size
91KB
-
MD5
3aa1d331142179e1df0d5272093b5763
-
SHA1
0974dc44c741295a91df0578d6aa70fa590ba0af
-
SHA256
31a794b94a12a0e319d88c39fe849434c0b331b453151a9a703b1054df8308d5
-
SHA512
789c13a32161715e7eec56c59027d073290cfbd084a44c176a99ed0ca365faaabcb59e6bdaee3ac084c623a40e7c78180b7d7311b885a2a23b0e9149ce1e3583
-
SSDEEP
1536:/6Nvi4OHydrKeumNEba+YFxs+i6pB1seTnOpp2KtLP7jNXXCrg36Zl3:/6Njdm3mKbads+z1nbOp4KtRA5
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-