General
-
Target
XCliet.exe
-
Size
68KB
-
Sample
241106-y4wx5swnaz
-
MD5
0815ae69147a697b5bae3d8d15cb7c75
-
SHA1
99a3b145ca36742aa0cbe0ef33829426f1dcf4ef
-
SHA256
4e986640769f16346bc1b6d9f5d033f4452c659b1275fc70bc736f1b2079828a
-
SHA512
992b165f6816f4711b3b0a6b7a8f83e4f58838abea7714df4bc8c30f7d9ed401d9b8f63296e3d13ca2d81894f754511628b042c5028feca4f54ca2b6bf70f0aa
-
SSDEEP
1536:RR1SVHku2BbeHCKNNJu+b4+QA6e2OcJv5SuUA:oReSTNu+b4e2Oa7R
Behavioral task
behavioral1
Sample
XCliet.exe
Resource
win11-20241007-en
Malware Config
Extracted
xworm
pst-evidence.gl.at.ply.gg:8848
-
Install_directory
%LocalAppData%
-
install_file
System32.exe
Targets
-
-
Target
XCliet.exe
-
Size
68KB
-
MD5
0815ae69147a697b5bae3d8d15cb7c75
-
SHA1
99a3b145ca36742aa0cbe0ef33829426f1dcf4ef
-
SHA256
4e986640769f16346bc1b6d9f5d033f4452c659b1275fc70bc736f1b2079828a
-
SHA512
992b165f6816f4711b3b0a6b7a8f83e4f58838abea7714df4bc8c30f7d9ed401d9b8f63296e3d13ca2d81894f754511628b042c5028feca4f54ca2b6bf70f0aa
-
SSDEEP
1536:RR1SVHku2BbeHCKNNJu+b4+QA6e2OcJv5SuUA:oReSTNu+b4e2Oa7R
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1