General
-
Target
XClient (2).bat
-
Size
278KB
-
Sample
241108-abxf7stkfm
-
MD5
87dfdc436f01e7015c743698464c3b8f
-
SHA1
da351d18f1495a92396cfc1c7252e1b145b9adb2
-
SHA256
e87acd0cba7115834705368c2f03b629261bbc80519dc5e65c4395f992b129bc
-
SHA512
751bec2933262568a60c32c3781083b1a087e9f750a2e70b74a376c0cb449a674422398b56314ed8059a92a1a8f92b881fcfd88f68a6f753fd82b18bdde5d499
-
SSDEEP
6144:KnqZeu/Xeq5Bg0g/4ZL01PA84vRlzzQbVZnPM:cKeIlgLzy8AdKVZPM
Static task
static1
Behavioral task
behavioral1
Sample
XClient (2).bat
Resource
win7-20240903-en
Malware Config
Extracted
xworm
127.0.0.1:32758
pressure-continuous.gl.at.ply.gg:32758
-
Install_directory
%Temp%
-
install_file
USB.exe
Targets
-
-
Target
XClient (2).bat
-
Size
278KB
-
MD5
87dfdc436f01e7015c743698464c3b8f
-
SHA1
da351d18f1495a92396cfc1c7252e1b145b9adb2
-
SHA256
e87acd0cba7115834705368c2f03b629261bbc80519dc5e65c4395f992b129bc
-
SHA512
751bec2933262568a60c32c3781083b1a087e9f750a2e70b74a376c0cb449a674422398b56314ed8059a92a1a8f92b881fcfd88f68a6f753fd82b18bdde5d499
-
SSDEEP
6144:KnqZeu/Xeq5Bg0g/4ZL01PA84vRlzzQbVZnPM:cKeIlgLzy8AdKVZPM
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-