General
-
Target
XClient.exe
-
Size
63KB
-
Sample
241115-xd4pmazdkq
-
MD5
babb94ecb1c83f5daa6fbe659eaaa4f9
-
SHA1
07289ec74f35061c515c6a835160ded06f823305
-
SHA256
c82bb2bdf2a6a156eaa280eb6cd7f006e5c2421a24490ea017e0048c5e4ab140
-
SHA512
93fb30710c1194bad4ce6cea55df8cca3b68dcb08a53dfb68f69cf6ca0695a3f89bae0e66d3f142c5d84cb9a03cc32ac65a815c9e859a1e4c39b50dd8609e6ab
-
SSDEEP
1536:GjFmCqZLnPN/2hFtT/PXl6/3d8/kbS5duRcdjT5WkOLuKZEY:GeZrNMF9/EFAkbS5AKZT5WkOLuI
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
xworm
127.0.0.1:56069
front-applications.gl.at.ply.gg:56069
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
XClient.exe
-
Size
63KB
-
MD5
babb94ecb1c83f5daa6fbe659eaaa4f9
-
SHA1
07289ec74f35061c515c6a835160ded06f823305
-
SHA256
c82bb2bdf2a6a156eaa280eb6cd7f006e5c2421a24490ea017e0048c5e4ab140
-
SHA512
93fb30710c1194bad4ce6cea55df8cca3b68dcb08a53dfb68f69cf6ca0695a3f89bae0e66d3f142c5d84cb9a03cc32ac65a815c9e859a1e4c39b50dd8609e6ab
-
SSDEEP
1536:GjFmCqZLnPN/2hFtT/PXl6/3d8/kbS5duRcdjT5WkOLuKZEY:GeZrNMF9/EFAkbS5AKZT5WkOLuI
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1