Analysis
-
max time kernel
1373s -
max time network
1434s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
11-11-2024 02:43
General
-
Target
XClient.exe
-
Size
40KB
-
MD5
768bb93362ea99b975342b09b11a4c26
-
SHA1
ec9cb1ab0934a9f11818cc5ad9c39d0583d802b4
-
SHA256
e6b169684de1f211a8eeff6c5ed818314efa1777ac31b84a0512b16b993d1bb1
-
SHA512
33a75a1db51b4debd4ac122402904336075eb8c6a5605b0a5a3f51f90612ef46a02c38cff2675a8ad5a7cec923b6ea6b0712bb781b3a0d2f5767399788352ce2
-
SSDEEP
768:AMErAgR3NcV6NsEayDmxxi+BJF5Pt9OY0J6BOMhW3/R3:Abrc2BaFmYFD99s6BOMMp
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:15863
Mutex
OiH47I7EhWxv4Ilj
Attributes
-
Install_directory
%AppData%
-
install_file
client.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/824-1-0x00000000006F0000-0x0000000000700000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 824 XClient.exe