General
-
Target
XClient.bat
-
Size
66KB
-
Sample
241118-z9mgbsvgne
-
MD5
ded6a5751236497347ed27d22226ef8d
-
SHA1
be89ce17f8dade3336202acc0b7ac78d3f9dbdca
-
SHA256
713b3b9b9cd5a6c17626b7f31a8173f5b397db4ea0d986114524fd988803f4f2
-
SHA512
8356eacb14d0cb5e552d383e6a5afe0873b1de2b9f002f743bd7d7aee50748011406964407e0ea0a3e04e03677410785cd385c72d88a10ced33d9315ba427ef4
-
SSDEEP
1536:iZAamnjGVMuIfaG8PUTjSQ3qYZmdN+p6CjQU+n2S+9Kh:WAamjVuWLTjR6YZ2Ip6CjQUo2SMQ
Static task
static1
Behavioral task
behavioral1
Sample
XClient.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
XClient.bat
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
xworm
name-hundred.gl.at.ply.gg:10055
-
install_file
Windows.exe
Targets
-
-
Target
XClient.bat
-
Size
66KB
-
MD5
ded6a5751236497347ed27d22226ef8d
-
SHA1
be89ce17f8dade3336202acc0b7ac78d3f9dbdca
-
SHA256
713b3b9b9cd5a6c17626b7f31a8173f5b397db4ea0d986114524fd988803f4f2
-
SHA512
8356eacb14d0cb5e552d383e6a5afe0873b1de2b9f002f743bd7d7aee50748011406964407e0ea0a3e04e03677410785cd385c72d88a10ced33d9315ba427ef4
-
SSDEEP
1536:iZAamnjGVMuIfaG8PUTjSQ3qYZmdN+p6CjQU+n2S+9Kh:WAamjVuWLTjR6YZ2Ip6CjQUo2SMQ
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-