General
-
Target
XClient.exe
-
Size
42KB
-
Sample
250120-x226psvmat
-
MD5
3982031e2e82143cf90b273b6b614231
-
SHA1
5a212b3d718c26cb34fc043b19979bfd37b07934
-
SHA256
08a0be6e3717d3ac5e6117536f42dbc4e08ff41958eb059038f648c447146198
-
SHA512
e3eee612bea1d8277136a849494cd9e1767df8b77557349e7b35d8fc3dea82031e19f5d4da767fa7589e4623b6a46671b98b7110c7f802a5ac4f5a24b036ae5a
-
SSDEEP
768:x/CsBpA2DYSPdTls3AyZrl2F59g/OCh80R8lEZ:x/C2dD0wF59g/OCu1EZ
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
https://pastebin.com/raw/cyX7R6Kt:1
H52DR5xUvBhWUz6h
-
Install_directory
%Userprofile%
-
install_file
msconfig.exe
-
pastebin_url
https://pastebin.com/raw/cyX7R6Kt
Targets
-
-
Target
XClient.exe
-
Size
42KB
-
MD5
3982031e2e82143cf90b273b6b614231
-
SHA1
5a212b3d718c26cb34fc043b19979bfd37b07934
-
SHA256
08a0be6e3717d3ac5e6117536f42dbc4e08ff41958eb059038f648c447146198
-
SHA512
e3eee612bea1d8277136a849494cd9e1767df8b77557349e7b35d8fc3dea82031e19f5d4da767fa7589e4623b6a46671b98b7110c7f802a5ac4f5a24b036ae5a
-
SSDEEP
768:x/CsBpA2DYSPdTls3AyZrl2F59g/OCh80R8lEZ:x/C2dD0wF59g/OCu1EZ
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1