General
-
Target
XClient.bat
-
Size
108KB
-
Sample
241114-e49z8atngs
-
MD5
85858e630a760180cab51cc060f9b811
-
SHA1
a9bb8f891c1f6b0fa07f6119304cd3f8798cb1b8
-
SHA256
9f5f9ef41661f2867dc646b2979808a51a37e1c09a7e01a14d920c4b53a8ab9b
-
SHA512
753864eecf3478a2f3f78a6743577c8aa81179664786730b0a3ad2ce8307451240a2186af9fb7522f0a1a0f99d6772eb52d684cc23a4c060c92ebfce43d59462
-
SSDEEP
3072:k2rUR0lBxUPbxNuh/Fqf2Zf5SJi1UF0Mg+O:kwUzjxUh/Fqf2Z5SJxg+O
Static task
static1
Behavioral task
behavioral1
Sample
XClient.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XClient.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
travel-competitive.gl.at.ply.gg:44130
-
Install_directory
%ProgramData%
-
install_file
SystemProcess.exe
Targets
-
-
Target
XClient.bat
-
Size
108KB
-
MD5
85858e630a760180cab51cc060f9b811
-
SHA1
a9bb8f891c1f6b0fa07f6119304cd3f8798cb1b8
-
SHA256
9f5f9ef41661f2867dc646b2979808a51a37e1c09a7e01a14d920c4b53a8ab9b
-
SHA512
753864eecf3478a2f3f78a6743577c8aa81179664786730b0a3ad2ce8307451240a2186af9fb7522f0a1a0f99d6772eb52d684cc23a4c060c92ebfce43d59462
-
SSDEEP
3072:k2rUR0lBxUPbxNuh/Fqf2Zf5SJi1UF0Mg+O:kwUzjxUh/Fqf2Z5SJxg+O
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-