General
-
Target
XClient.exe
-
Size
73KB
-
Sample
241109-r12wnaweph
-
MD5
29489bd7b40f8fe8e9f8b5eef2e7934b
-
SHA1
808421866619a366107a592dc4936e4a3fde404e
-
SHA256
ee93b574812d8734c3b5eba01e7521a74010c8817f200781505b1002b789394d
-
SHA512
dcf6ab092887cb0313a9dd8b3c5222e9d22d18d8efd24151627dc3fad56e0f812576ed9434c21853c2cb730412eb76ffb1c18689368e0ab34ba3e6e80287b1d2
-
SSDEEP
1536:d3Qg91AbJLf+HOVvZ6T+bY+j/jDHIkMRytbaZORK0NLTBVhb8:agTA5JC+bYeLXAytbyORVLjhb8
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
192.168.29.241:22119
books-royalty.gl.at.ply.gg:22119
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Targets
-
-
Target
XClient.exe
-
Size
73KB
-
MD5
29489bd7b40f8fe8e9f8b5eef2e7934b
-
SHA1
808421866619a366107a592dc4936e4a3fde404e
-
SHA256
ee93b574812d8734c3b5eba01e7521a74010c8817f200781505b1002b789394d
-
SHA512
dcf6ab092887cb0313a9dd8b3c5222e9d22d18d8efd24151627dc3fad56e0f812576ed9434c21853c2cb730412eb76ffb1c18689368e0ab34ba3e6e80287b1d2
-
SSDEEP
1536:d3Qg91AbJLf+HOVvZ6T+bY+j/jDHIkMRytbaZORK0NLTBVhb8:agTA5JC+bYeLXAytbyORVLjhb8
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1