General
-
Target
XClient.exe
-
Size
83KB
-
Sample
250118-wb1phs1jcn
-
MD5
c1d3a7d174afa1e7c9c8005ae0a33a6d
-
SHA1
c52819e3fe93af8156046cbc2002e4c895072a9a
-
SHA256
2d1e8047e2ded5efb6eb40b598128d026d68f5202893dce72c3dcbd4c260b8e7
-
SHA512
0343d57aae17c7d985477e5ab60b5655f588775356c3b43b7a932bb56a04c9ea6fb7ab6daae62013ed3dcc531d44c04a7ce00814b01cd09a07f9bf9cbeb35089
-
SSDEEP
1536:5u/rlJEdXdakv+bklBfEqIw6RqymrBS+jrOueqZjP6Ub:5is+bklBu49SirOup0e
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
XClient.exe
-
Size
83KB
-
MD5
c1d3a7d174afa1e7c9c8005ae0a33a6d
-
SHA1
c52819e3fe93af8156046cbc2002e4c895072a9a
-
SHA256
2d1e8047e2ded5efb6eb40b598128d026d68f5202893dce72c3dcbd4c260b8e7
-
SHA512
0343d57aae17c7d985477e5ab60b5655f588775356c3b43b7a932bb56a04c9ea6fb7ab6daae62013ed3dcc531d44c04a7ce00814b01cd09a07f9bf9cbeb35089
-
SSDEEP
1536:5u/rlJEdXdakv+bklBfEqIw6RqymrBS+jrOueqZjP6Ub:5is+bklBu49SirOup0e
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1