General
-
Target
a3801bf12770503f6665ffd804fe80b0861091b0bda11a120810f9317275c034
-
Size
81KB
-
Sample
241204-bqmqzszlaq
-
MD5
156bf10e2547694821aef2fb2c6e3c12
-
SHA1
747585d95dc64571178f4551f521b7ceacce97c3
-
SHA256
a3801bf12770503f6665ffd804fe80b0861091b0bda11a120810f9317275c034
-
SHA512
d0a91dfa291e5c02eb767c55597e97d7efd30314282de3c8fe716fba778bc76d172d3e9154dfb58b4b70b40e73909a50a0bd683848dbc1c9a2c5fe460ed1bdf0
-
SSDEEP
1536:RIuVj3IAXiZYzegei1sZZ9oQ7u6Etr0bEgCZTq6fxuOu3PUkZ6Or4uZ:xNIAXlLCiiu6EabEvJuOu3/oOrdZ
Behavioral task
behavioral1
Sample
a3801bf12770503f6665ffd804fe80b0861091b0bda11a120810f9317275c034.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
a3801bf12770503f6665ffd804fe80b0861091b0bda11a120810f9317275c034.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
127.0.0.1:7777
45.200.148.238:7777
-
Install_directory
%Userprofile%
-
install_file
XClient.exe
Targets
-
-
Target
a3801bf12770503f6665ffd804fe80b0861091b0bda11a120810f9317275c034
-
Size
81KB
-
MD5
156bf10e2547694821aef2fb2c6e3c12
-
SHA1
747585d95dc64571178f4551f521b7ceacce97c3
-
SHA256
a3801bf12770503f6665ffd804fe80b0861091b0bda11a120810f9317275c034
-
SHA512
d0a91dfa291e5c02eb767c55597e97d7efd30314282de3c8fe716fba778bc76d172d3e9154dfb58b4b70b40e73909a50a0bd683848dbc1c9a2c5fe460ed1bdf0
-
SSDEEP
1536:RIuVj3IAXiZYzegei1sZZ9oQ7u6Etr0bEgCZTq6fxuOu3PUkZ6Or4uZ:xNIAXlLCiiu6EabEvJuOu3/oOrdZ
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-