General
-
Target
xclant.exe
-
Size
70KB
-
Sample
241119-c2fmgsyfpa
-
MD5
be02e2396810bc407f7ada8d02c588c1
-
SHA1
77c1f21128308f766fc4b359c48e63c146beca52
-
SHA256
9271cc1d1de56861488f97a6c38b4175fda1d31992bf3349aad46f79c3d6f0a6
-
SHA512
cefdd672a809016390157cd4ca9072284746e1082bfbc761f93da7b8c240244e981e739370787dfe1d9c45fce1a6bd9f990c65957411649beea2d908ecc4c907
-
SSDEEP
1536:zOs8dJha3EWE70GlLsAo/j5b6ybuXjGs6X9mObkU83:zOBdXQlIxo75b6fXjW9mObkn3
Behavioral task
behavioral1
Sample
xclant.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
xclant.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
147.185.221.19:22298
-
Install_directory
%AppData%
-
install_file
SystemUser32.exe
Targets
-
-
Target
xclant.exe
-
Size
70KB
-
MD5
be02e2396810bc407f7ada8d02c588c1
-
SHA1
77c1f21128308f766fc4b359c48e63c146beca52
-
SHA256
9271cc1d1de56861488f97a6c38b4175fda1d31992bf3349aad46f79c3d6f0a6
-
SHA512
cefdd672a809016390157cd4ca9072284746e1082bfbc761f93da7b8c240244e981e739370787dfe1d9c45fce1a6bd9f990c65957411649beea2d908ecc4c907
-
SSDEEP
1536:zOs8dJha3EWE70GlLsAo/j5b6ybuXjGs6X9mObkU83:zOBdXQlIxo75b6fXjW9mObkn3
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1