General
-
Target
XClient.exe
-
Size
49KB
-
Sample
241218-jd6bka1kgm
-
MD5
89bc15122f16df2eb618add250990ad0
-
SHA1
47e459aa4ed8a83a84a4912db8a1dc61fb8a6375
-
SHA256
4cc278ee6bcb828bf809f398e58e023099a02f7fe372d0d0a6632952b4093b4e
-
SHA512
4d465eeffb4cc1f886614e35b2075a97d604fd131acba2119ff0c7c5c43e9ba90006f67334195f7c415c888b3ef8441e13e3b4890968c8d547258e2e51d5cbfb
-
SSDEEP
768:+WFNI2RdYFIOoUHEdc8e6akgkb1gndeaet/OtsXhMHN50w:+87nYercEdclHkb1gncFO8eH70w
Malware Config
Extracted
xworm
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/hMSQvtUM
Targets
-
-
Target
XClient.exe
-
Size
49KB
-
MD5
89bc15122f16df2eb618add250990ad0
-
SHA1
47e459aa4ed8a83a84a4912db8a1dc61fb8a6375
-
SHA256
4cc278ee6bcb828bf809f398e58e023099a02f7fe372d0d0a6632952b4093b4e
-
SHA512
4d465eeffb4cc1f886614e35b2075a97d604fd131acba2119ff0c7c5c43e9ba90006f67334195f7c415c888b3ef8441e13e3b4890968c8d547258e2e51d5cbfb
-
SSDEEP
768:+WFNI2RdYFIOoUHEdc8e6akgkb1gndeaet/OtsXhMHN50w:+87nYercEdclHkb1gncFO8eH70w
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
Legitimate hosting services abused for malware hosting/C2
-