Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
19-01-2025 09:25
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10ltsc2021-20250113-en
5 signatures
150 seconds
General
-
Target
XClient.exe
-
Size
33KB
-
MD5
9548ab8c25f4d68ee82f30614b894610
-
SHA1
3cd430018f06d22887175307e2d14e4796d86222
-
SHA256
2462f6663eed6000fe8db91857170246530df7ce156ced422c73b3f1000f3ec9
-
SHA512
635eb77d7586411539f11b41135392c3ab096617f50f4b652226d073624b8d1f684c0a01203334ee2f9e5929a365a33d404f4e1f4c79752ec8736f3635f0d8ba
-
SSDEEP
384:Tl0UMD9SszMJ11DcS/i8L7zZ3ZFsLcvSAOo6PRApkFTBLTsOZwpGN2v99IkuisoH:JoD9vQB3Z3HJvlOPVF89jsOjhCbg
Malware Config
Extracted
Family
xworm
Version
5.0
C2
7.tcp.eu.ngrok.io:11135
Mutex
Y5ZJT9tdrWfHkA4C
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1664-1-0x0000000000280000-0x000000000028E000-memory.dmp family_xworm -
Xworm family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 42 7.tcp.eu.ngrok.io 10 7.tcp.eu.ngrok.io 31 7.tcp.eu.ngrok.io -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1664 XClient.exe