General
-
Target
XClient.exe
-
Size
39KB
-
Sample
250123-rxxgrstqhp
-
MD5
37708340719cd692b521653ed51a8998
-
SHA1
f896256d8c8d91e9ac690b8eee55b405433497f5
-
SHA256
beeb4bc88b6912289e6be134662c6794f21416e3a70d61ee18c0c4e1d84809ce
-
SHA512
b28acc5f1e39b7a9eb8e1d41adb3c454e5d76587988e845aa913258efadd9158795a1761e33152d513cf8167b0d615e074ec9fe48db801c35350a5fa0ad08e67
-
SSDEEP
768:Znp2iB3sNvzK2AwjzeN2YEW7KbiCqEoFN9UrcMUcOphmjtYGj:+iB8V6NiWlCq9FN9UrDROp+Bj
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
https://pastebin.com/raw/wtvveYnA:1
cRWkyXhFU3sXnrK4
-
Install_directory
%Userprofile%
-
install_file
msconfig.exe
-
pastebin_url
https://pastebin.com/raw/wtvveYnA
Targets
-
-
Target
XClient.exe
-
Size
39KB
-
MD5
37708340719cd692b521653ed51a8998
-
SHA1
f896256d8c8d91e9ac690b8eee55b405433497f5
-
SHA256
beeb4bc88b6912289e6be134662c6794f21416e3a70d61ee18c0c4e1d84809ce
-
SHA512
b28acc5f1e39b7a9eb8e1d41adb3c454e5d76587988e845aa913258efadd9158795a1761e33152d513cf8167b0d615e074ec9fe48db801c35350a5fa0ad08e67
-
SSDEEP
768:Znp2iB3sNvzK2AwjzeN2YEW7KbiCqEoFN9UrcMUcOphmjtYGj:+iB8V6NiWlCq9FN9UrDROp+Bj
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1