General
-
Target
XClien2t.exe
-
Size
39KB
-
Sample
250123-rzp6gatrdl
-
MD5
cb66c0aecefa400bd702fdfce6768867
-
SHA1
86eff3a8079fac5ba6bee0c7305dcfb02bf11dff
-
SHA256
e984d24a32bfbd3da67c941e130e6cc73efb0dbd343f549b49626fd059a84c7e
-
SHA512
f9436c34ebfe6ea6db97eaef00d0e5c8b5196fe7e01f6c4cb3ea811c98a80b6e735de8e74bb5a2b0404f69001f1aeae160386a9bb402f4ba3da65bb7d5458831
-
SSDEEP
768:Inp2iB3sNvzK2Awjzef/YEW7KbiCqEoFN9UeGOphFjtYGK:RiB8V6f/WlCq9FN9UvOplBK
Behavioral task
behavioral1
Sample
XClien2t.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
https://pastebin.com/raw/s98jTNJs:1
skS6kMhEKAoBazrr
-
Install_directory
%Userprofile%
-
install_file
msconfig.exe
-
pastebin_url
https://pastebin.com/raw/s98jTNJs
Targets
-
-
Target
XClien2t.exe
-
Size
39KB
-
MD5
cb66c0aecefa400bd702fdfce6768867
-
SHA1
86eff3a8079fac5ba6bee0c7305dcfb02bf11dff
-
SHA256
e984d24a32bfbd3da67c941e130e6cc73efb0dbd343f549b49626fd059a84c7e
-
SHA512
f9436c34ebfe6ea6db97eaef00d0e5c8b5196fe7e01f6c4cb3ea811c98a80b6e735de8e74bb5a2b0404f69001f1aeae160386a9bb402f4ba3da65bb7d5458831
-
SSDEEP
768:Inp2iB3sNvzK2Awjzef/YEW7KbiCqEoFN9UeGOphFjtYGK:RiB8V6f/WlCq9FN9UvOplBK
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1