General
-
Target
XClient.exe
-
Size
64KB
-
Sample
250119-ze6xgsvmav
-
MD5
0b825a60d5232c19548fe6bee6eceaf7
-
SHA1
70b29e65c74ee6d11dd99ab644ea967efd868aa2
-
SHA256
ad13779dfed42b4f1fc882216a9157bc65aee15f058b784ea809b86fceae34af
-
SHA512
408f6f6239a4a11913f012d7a6ba8d7c48896312a894d574b892553aeb6658ad1f4599d1cc899beb2e762c6496654077dfbe253e0f4a53d63a5dd1327f1d570a
-
SSDEEP
1536:ElDBb5dZjeQ+3uYkkf9pWbkoxy061cOirS0LpHn2TfaS:Ell5/7+3uYkkXWbk+jOirS0dHEaS
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
memory-lottery.gl.at.ply.gg:444
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
XClient.exe
-
Size
64KB
-
MD5
0b825a60d5232c19548fe6bee6eceaf7
-
SHA1
70b29e65c74ee6d11dd99ab644ea967efd868aa2
-
SHA256
ad13779dfed42b4f1fc882216a9157bc65aee15f058b784ea809b86fceae34af
-
SHA512
408f6f6239a4a11913f012d7a6ba8d7c48896312a894d574b892553aeb6658ad1f4599d1cc899beb2e762c6496654077dfbe253e0f4a53d63a5dd1327f1d570a
-
SSDEEP
1536:ElDBb5dZjeQ+3uYkkf9pWbkoxy061cOirS0LpHn2TfaS:Ell5/7+3uYkkXWbk+jOirS0dHEaS
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1