General
-
Target
045334c2bdc1eb9eb76036c2cae217fe3c1e7fd4f41bb849c4ba42a6c67cad21N.exe
-
Size
63KB
-
Sample
241231-w8yanatjey
-
MD5
dfd48ef85c854afb7aa3a8d101ab5050
-
SHA1
253d72b188c6f7026c191eef7ed99367cd7ddfdb
-
SHA256
045334c2bdc1eb9eb76036c2cae217fe3c1e7fd4f41bb849c4ba42a6c67cad21
-
SHA512
9e57681006f0224bc1484722eac8a2eb698e9ffa505ca0a3abd846a1e01448f56ee35ef20d02efcecc38d08782ec280468b4aa9f16a97c00c2148bfbc863f625
-
SSDEEP
1536:SIfKqlxoqCjVQVw28BBgdE9rIuVO/KbHEMaDdnYi96jdtOU3iK:SIfKCxCjj20SdE9EeO/KbHEHRvCtOU3N
Behavioral task
behavioral1
Sample
045334c2bdc1eb9eb76036c2cae217fe3c1e7fd4f41bb849c4ba42a6c67cad21N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
045334c2bdc1eb9eb76036c2cae217fe3c1e7fd4f41bb849c4ba42a6c67cad21N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
ii-heavy.gl.at.ply.gg:45541:45541
-
Install_directory
%Userprofile%
-
install_file
XClient.exe
Targets
-
-
Target
045334c2bdc1eb9eb76036c2cae217fe3c1e7fd4f41bb849c4ba42a6c67cad21N.exe
-
Size
63KB
-
MD5
dfd48ef85c854afb7aa3a8d101ab5050
-
SHA1
253d72b188c6f7026c191eef7ed99367cd7ddfdb
-
SHA256
045334c2bdc1eb9eb76036c2cae217fe3c1e7fd4f41bb849c4ba42a6c67cad21
-
SHA512
9e57681006f0224bc1484722eac8a2eb698e9ffa505ca0a3abd846a1e01448f56ee35ef20d02efcecc38d08782ec280468b4aa9f16a97c00c2148bfbc863f625
-
SSDEEP
1536:SIfKqlxoqCjVQVw28BBgdE9rIuVO/KbHEMaDdnYi96jdtOU3iK:SIfKCxCjj20SdE9EeO/KbHEHRvCtOU3N
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1