General
-
Target
XClient.exe
-
Size
34KB
-
Sample
241125-1e4msstrar
-
MD5
c066e2162e9aa7dd672e4c20c1c8c9eb
-
SHA1
20c061ca760ed127dd7c43ad5147064af4009d93
-
SHA256
f2c139ededc6158ae672aa2ae484cbdf503517af131062ddd80a106dd7827557
-
SHA512
aa75920ffef507b16ed23f7c4033374ec5b1ae56d9f6f32db6a0b632366a031280be4b6c2fed4ef895fda459899dccb62def861ffb90d287a23112a9d56a4adf
-
SSDEEP
384:PxXv9qZ/QXokXcjlcTB+Gx//wD7rXVhLHzVdfgkBE2jHuh/58pkFyHBLTLZwYGoy:JXB2GxebHzDyCw/VFye9F+Ojh7yaEr4
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
cheflilou-43810.portmap.host:43810
JQrIKWspeoVSCrcE
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
umbral
https://discord.com/api/webhooks/1300923716687106088/zBYqs8nJ3MptGRgCn45okL0BWnQ0FdPIXStaaykk5DhZfBnHinW4M0Ve6U2CSPsMATf2
Targets
-
-
Target
XClient.exe
-
Size
34KB
-
MD5
c066e2162e9aa7dd672e4c20c1c8c9eb
-
SHA1
20c061ca760ed127dd7c43ad5147064af4009d93
-
SHA256
f2c139ededc6158ae672aa2ae484cbdf503517af131062ddd80a106dd7827557
-
SHA512
aa75920ffef507b16ed23f7c4033374ec5b1ae56d9f6f32db6a0b632366a031280be4b6c2fed4ef895fda459899dccb62def861ffb90d287a23112a9d56a4adf
-
SSDEEP
384:PxXv9qZ/QXokXcjlcTB+Gx//wD7rXVhLHzVdfgkBE2jHuh/58pkFyHBLTLZwYGoy:JXB2GxebHzDyCw/VFye9F+Ojh7yaEr4
-
Detect Neshta payload
-
Detect Umbral payload
-
Detect Xworm Payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
StormKitty payload
-
Stormkitty family
-
Umbral family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1