General
-
Target
4978a378806fd5d68c08ad4602f80d3f5f1f870cb072475bd32b7a8ca32a3d88
-
Size
511KB
-
Sample
241204-sjjjesvjfl
-
MD5
632f722953592e348c533977a5f251d7
-
SHA1
d4e62b7060f00888d43eb1fbb0d0f8f5fbd8ef4d
-
SHA256
4978a378806fd5d68c08ad4602f80d3f5f1f870cb072475bd32b7a8ca32a3d88
-
SHA512
1b41503d38a2862e499ec5c21c7510cb8a95676eb5eca546910ddddf09a1c1aaf0216c572119f0c3ffc0f7a0a4516823cae9f32b27bea381c03d4c07dcaaee56
-
SSDEEP
12288:HCfia2Q+RH4w8yqJ3ItYvk71CyBC7Lkf/:HYiHQ+R5jYc7p
Static task
static1
Behavioral task
behavioral1
Sample
4978a378806fd5d68c08ad4602f80d3f5f1f870cb072475bd32b7a8ca32a3d88.exe
Resource
win7-20240708-en
Malware Config
Extracted
xworm
104.250.180.178:7061
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
4978a378806fd5d68c08ad4602f80d3f5f1f870cb072475bd32b7a8ca32a3d88
-
Size
511KB
-
MD5
632f722953592e348c533977a5f251d7
-
SHA1
d4e62b7060f00888d43eb1fbb0d0f8f5fbd8ef4d
-
SHA256
4978a378806fd5d68c08ad4602f80d3f5f1f870cb072475bd32b7a8ca32a3d88
-
SHA512
1b41503d38a2862e499ec5c21c7510cb8a95676eb5eca546910ddddf09a1c1aaf0216c572119f0c3ffc0f7a0a4516823cae9f32b27bea381c03d4c07dcaaee56
-
SSDEEP
12288:HCfia2Q+RH4w8yqJ3ItYvk71CyBC7Lkf/:HYiHQ+R5jYc7p
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-