General
-
Target
https://cdn.discordapp.com/attachments/1331926146660700191/1332017148335357974/XClie1111111111111111111111111111111111111111nt.zip?ex=6793b923&is=679267a3&hm=c4334304b421fc850b10d37cb04adcaa2c66a8d39a3ef0194d2f4d3082baaeb7&
-
Sample
250123-tgblgavlht
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1331926146660700191/1332017148335357974/XClie1111111111111111111111111111111111111111nt.zip?ex=6793b923&is=679267a3&hm=c4334304b421fc850b10d37cb04adcaa2c66a8d39a3ef0194d2f4d3082baaeb7&
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
https://cdn.discordapp.com/attachments/1331926146660700191/1332017148335357974/XClie1111111111111111111111111111111111111111nt.zip?ex=6793b923&is=679267a3&hm=c4334304b421fc850b10d37cb04adcaa2c66a8d39a3ef0194d2f4d3082baaeb7&
Resource
win11-20241007-en
Malware Config
Extracted
xworm
sanek416-59257.portmap.host:59257
-
Install_directory
%Temp%
-
install_file
Runtimebroker.exe
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1331926146660700191/1332017148335357974/XClie1111111111111111111111111111111111111111nt.zip?ex=6793b923&is=679267a3&hm=c4334304b421fc850b10d37cb04adcaa2c66a8d39a3ef0194d2f4d3082baaeb7&
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-