General
-
Target
c1378ff7aaacea446762f5878ec501260bcdeb869e06a8f0a25845845183395cN.exe
-
Size
159KB
-
Sample
250120-ep9qxazqfs
-
MD5
f3b25838fa8d402f6c93ddd23979b810
-
SHA1
3935445639b0373ff59c5406315a480678e80f9e
-
SHA256
c1378ff7aaacea446762f5878ec501260bcdeb869e06a8f0a25845845183395c
-
SHA512
a66f7dbb3726a6fd116f6cb9229fb9f06879bdf9e5a550bd64582fded71d9d9433fbf71b754f598f550436badfdae62a6d6ff7e1ac91c41c203162280c583715
-
SSDEEP
3072:0325N7aVopufIeZuVGoFkfAylFYOKYoGCllFhdoH3hZ9Roe2eX9px:j1U8peZuVDRkClAXhT2eF9
Static task
static1
Behavioral task
behavioral1
Sample
c1378ff7aaacea446762f5878ec501260bcdeb869e06a8f0a25845845183395cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c1378ff7aaacea446762f5878ec501260bcdeb869e06a8f0a25845845183395cN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
indian-tall.gl.at.ply.gg:65520
-
Install_directory
%Temp%
-
install_file
XClient.exe
-
pastebin_url
https://pastebin.com/raw/wXYjM7Vm
Targets
-
-
Target
c1378ff7aaacea446762f5878ec501260bcdeb869e06a8f0a25845845183395cN.exe
-
Size
159KB
-
MD5
f3b25838fa8d402f6c93ddd23979b810
-
SHA1
3935445639b0373ff59c5406315a480678e80f9e
-
SHA256
c1378ff7aaacea446762f5878ec501260bcdeb869e06a8f0a25845845183395c
-
SHA512
a66f7dbb3726a6fd116f6cb9229fb9f06879bdf9e5a550bd64582fded71d9d9433fbf71b754f598f550436badfdae62a6d6ff7e1ac91c41c203162280c583715
-
SSDEEP
3072:0325N7aVopufIeZuVGoFkfAylFYOKYoGCllFhdoH3hZ9Roe2eX9px:j1U8peZuVDRkClAXhT2eF9
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1