Resubmissions
05-11-2024 13:34
241105-qt8j7asakd 1005-11-2024 13:29
241105-qrffma1mcz 1002-08-2023 05:26
230802-f4w9ssdh9z 10Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 13:29
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240903-en
General
-
Target
XClient.exe
-
Size
91KB
-
MD5
3aa1d331142179e1df0d5272093b5763
-
SHA1
0974dc44c741295a91df0578d6aa70fa590ba0af
-
SHA256
31a794b94a12a0e319d88c39fe849434c0b331b453151a9a703b1054df8308d5
-
SHA512
789c13a32161715e7eec56c59027d073290cfbd084a44c176a99ed0ca365faaabcb59e6bdaee3ac084c623a40e7c78180b7d7311b885a2a23b0e9149ce1e3583
-
SSDEEP
1536:/6Nvi4OHydrKeumNEba+YFxs+i6pB1seTnOpp2KtLP7jNXXCrg36Zl3:/6Njdm3mKbads+z1nbOp4KtRA5
Malware Config
Extracted
xworm
3.1
152.67.162.194:10001
-
Install_directory
%ProgramData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6250773381:AAH64g12buc-51fqITw2Asa_4dMEvEQn-7g/sendMessage?chat_id=749417294
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3968-1-0x0000000000A20000-0x0000000000A3C000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3968 XClient.exe