General
-
Target
0ee209155e17689bea70904f4cb4f546e01ae1824cc7f0f0a29d5c5a8c69d101
-
Size
67KB
-
Sample
241113-yecg7sybkb
-
MD5
df327ace413f3d7d7096d3691436c8b2
-
SHA1
01062e8125a785b3a345dda2129586f5a6d48581
-
SHA256
0ee209155e17689bea70904f4cb4f546e01ae1824cc7f0f0a29d5c5a8c69d101
-
SHA512
ae24fcaf06217094563b5c8a096259a6afd760c504ea9075419173b0f571cbd5d96afccd737eed9efa5de2e72e8118dfbd379d5e4ca3814a8d47c68a84b00a91
-
SSDEEP
1536:CQKvpn+V+eAIDIjci+JCDNB1Hbo3BjT6hMmOwmNsSkA:Ipfmmci+01Hbo3tmOwm+5A
Behavioral task
behavioral1
Sample
0ee209155e17689bea70904f4cb4f546e01ae1824cc7f0f0a29d5c5a8c69d101.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ee209155e17689bea70904f4cb4f546e01ae1824cc7f0f0a29d5c5a8c69d101.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
price-slow.gl.at.ply.gg:28067
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
0ee209155e17689bea70904f4cb4f546e01ae1824cc7f0f0a29d5c5a8c69d101
-
Size
67KB
-
MD5
df327ace413f3d7d7096d3691436c8b2
-
SHA1
01062e8125a785b3a345dda2129586f5a6d48581
-
SHA256
0ee209155e17689bea70904f4cb4f546e01ae1824cc7f0f0a29d5c5a8c69d101
-
SHA512
ae24fcaf06217094563b5c8a096259a6afd760c504ea9075419173b0f571cbd5d96afccd737eed9efa5de2e72e8118dfbd379d5e4ca3814a8d47c68a84b00a91
-
SSDEEP
1536:CQKvpn+V+eAIDIjci+JCDNB1Hbo3BjT6hMmOwmNsSkA:Ipfmmci+01Hbo3tmOwm+5A
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-