Analysis
-
max time kernel
63s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 17:33
General
-
Target
XClient.exe
-
Size
33KB
-
MD5
679f221642d2f414551f208a44d402bc
-
SHA1
41daa801a962f772d54618c1c655fc8097183f9a
-
SHA256
0916b8f2d847b9a8b405fcb5048ff013bd7bd53a9fe2ab86538fa1306fcf6894
-
SHA512
e37ec763f01e1e0e3f3a9c76d8de22ddf39cc3e09b238854a8cac600465f822d0de15b251cfda8b4449e7334468bff7239225c3126966f7e0afdb7922c2251a4
-
SSDEEP
384:zfP/SG1aTTcPTEUV75LC2SM42pfL3iB7OxVqWqKRApkFXBLTsOZwpGN2v99IkuiR:T11weF3X42JiB70lVF49jfOjhKbr
Malware Config
Extracted
Family
xworm
Version
5.0
C2
127.0.0.1:56069
front-applications.gl.at.ply.gg:56069
Mutex
Rc1OAQLMDkEjRtRF
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1892-1-0x0000000000340000-0x000000000034E000-memory.dmp family_xworm -
Xworm family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1892 XClient.exe