General
-
Target
XClient.exe
-
Size
33KB
-
Sample
250119-ld2pgsslgs
-
MD5
9548ab8c25f4d68ee82f30614b894610
-
SHA1
3cd430018f06d22887175307e2d14e4796d86222
-
SHA256
2462f6663eed6000fe8db91857170246530df7ce156ced422c73b3f1000f3ec9
-
SHA512
635eb77d7586411539f11b41135392c3ab096617f50f4b652226d073624b8d1f684c0a01203334ee2f9e5929a365a33d404f4e1f4c79752ec8736f3635f0d8ba
-
SSDEEP
384:Tl0UMD9SszMJ11DcS/i8L7zZ3ZFsLcvSAOo6PRApkFTBLTsOZwpGN2v99IkuisoH:JoD9vQB3Z3HJvlOPVF89jsOjhCbg
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
xworm
5.0
7.tcp.eu.ngrok.io:11135
Y5ZJT9tdrWfHkA4C
-
install_file
USB.exe
Targets
-
-
Target
XClient.exe
-
Size
33KB
-
MD5
9548ab8c25f4d68ee82f30614b894610
-
SHA1
3cd430018f06d22887175307e2d14e4796d86222
-
SHA256
2462f6663eed6000fe8db91857170246530df7ce156ced422c73b3f1000f3ec9
-
SHA512
635eb77d7586411539f11b41135392c3ab096617f50f4b652226d073624b8d1f684c0a01203334ee2f9e5929a365a33d404f4e1f4c79752ec8736f3635f0d8ba
-
SSDEEP
384:Tl0UMD9SszMJ11DcS/i8L7zZ3ZFsLcvSAOo6PRApkFTBLTsOZwpGN2v99IkuisoH:JoD9vQB3Z3HJvlOPVF89jsOjhCbg
-
Detect Xworm Payload
-
Xworm family
-
Legitimate hosting services abused for malware hosting/C2
-