General
-
Target
XClient.exe
-
Size
38KB
-
Sample
241113-reg95aspaw
-
MD5
bfbb29d4f8dc3ce3b7b67e055fb70bcf
-
SHA1
f9a646e32fb5ec8eb10f1486e5a95883a902b108
-
SHA256
dd90b5843c6550de3403c5bf221c3639e56083e337f49050cd21c625229d9609
-
SHA512
e05e3db627c1a9d8de16f1357a95f330b71724dd8ae182a62ad0d3c55414d6ad0caa4ca28f0bb746173565cd1705aa82fa8d41cd99ddddbc43379a746f568a71
-
SSDEEP
768:siS8brf7blu3ml5G7m9NFfZk7FWPB9WxOOMhTaQkrl:zpnf7c+5PFyFO9WxOOM5sl
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
5.0
instruments-survivor.gl.at.ply.gg:29973
Bv3T1nydYnsmIsFU
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Targets
-
-
Target
XClient.exe
-
Size
38KB
-
MD5
bfbb29d4f8dc3ce3b7b67e055fb70bcf
-
SHA1
f9a646e32fb5ec8eb10f1486e5a95883a902b108
-
SHA256
dd90b5843c6550de3403c5bf221c3639e56083e337f49050cd21c625229d9609
-
SHA512
e05e3db627c1a9d8de16f1357a95f330b71724dd8ae182a62ad0d3c55414d6ad0caa4ca28f0bb746173565cd1705aa82fa8d41cd99ddddbc43379a746f568a71
-
SSDEEP
768:siS8brf7blu3ml5G7m9NFfZk7FWPB9WxOOMhTaQkrl:zpnf7c+5PFyFO9WxOOM5sl
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Xworm family
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-