General
-
Target
quest mod installer.exe
-
Size
165KB
-
Sample
241231-qjty2ssjas
-
MD5
6b223bcb2346baac936dc94b8fbc0e80
-
SHA1
672fb1856a64c9d71d438e9beaf8094aeb65e4cb
-
SHA256
573b2ca9df39dc24d7e769786b7fd1bcafda80c2b7404b919e92cbbc65db9baf
-
SHA512
2c22c62be5490383f29ea1b9023dbffce9f0d9a36431bbbc494d29e041896758878f729539abc793e2ae5e3ef4b27666e50064b11a284a7ef9d27c2c57a77443
-
SSDEEP
3072:UvRZfiACBoHbT0/h5dOMpkMZ0Bz65/M6If+3Js+3JFkKeTnC:UvRZfiIbwhFHZ0xBt25
Behavioral task
behavioral1
Sample
quest mod installer.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
127.0.0.1:53655
147.185.221.24::53655
147.185.221.24:53655
topics-properties.gl.at.ply.gg:53655
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
quest mod installer.exe
-
Size
165KB
-
MD5
6b223bcb2346baac936dc94b8fbc0e80
-
SHA1
672fb1856a64c9d71d438e9beaf8094aeb65e4cb
-
SHA256
573b2ca9df39dc24d7e769786b7fd1bcafda80c2b7404b919e92cbbc65db9baf
-
SHA512
2c22c62be5490383f29ea1b9023dbffce9f0d9a36431bbbc494d29e041896758878f729539abc793e2ae5e3ef4b27666e50064b11a284a7ef9d27c2c57a77443
-
SSDEEP
3072:UvRZfiACBoHbT0/h5dOMpkMZ0Bz65/M6If+3Js+3JFkKeTnC:UvRZfiIbwhFHZ0xBt25
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-