General
-
Target
XClient.bat
-
Size
267KB
-
Sample
241204-d6sy2svrcl
-
MD5
f4420a832ed130530cbb75e346fb637b
-
SHA1
f15be4046b4932f88fb202ab82cdc03de63a822f
-
SHA256
a9b29a1f48922172ff22c84a932ba1a7d718614aa43ecb2efb51b11600bbb9bb
-
SHA512
a32f75fb022ba2b48008571d46ea854f693b7a1514f6e1a388c26ef3c014d39192604a6c798a7ee92e7d1a538f4d26c17bec5e8d5989f3c87da4de276066526c
-
SSDEEP
3072:CiJEEtDlM+evBkvJ1YvSmSxGcnaVPRhDclXttV5wTuBZf2mBmGAdSuHtUYhFUctv:CctDlM+ABk8SmS3gPjc1BuSBRzyXElJw
Static task
static1
Behavioral task
behavioral1
Sample
XClient.bat
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:37695
excellent-waiver.gl.at.ply.gg:37695
8Vpjd826AMaPZvGS
-
install_file
USB.exe
Targets
-
-
Target
XClient.bat
-
Size
267KB
-
MD5
f4420a832ed130530cbb75e346fb637b
-
SHA1
f15be4046b4932f88fb202ab82cdc03de63a822f
-
SHA256
a9b29a1f48922172ff22c84a932ba1a7d718614aa43ecb2efb51b11600bbb9bb
-
SHA512
a32f75fb022ba2b48008571d46ea854f693b7a1514f6e1a388c26ef3c014d39192604a6c798a7ee92e7d1a538f4d26c17bec5e8d5989f3c87da4de276066526c
-
SSDEEP
3072:CiJEEtDlM+evBkvJ1YvSmSxGcnaVPRhDclXttV5wTuBZf2mBmGAdSuHtUYhFUctv:CctDlM+ABk8SmS3gPjc1BuSBRzyXElJw
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-