General
-
Target
XvcClient.exe
-
Size
39KB
-
Sample
250123-yw5v3stjdr
-
MD5
8a1f910de42bbdfc2967424952092c93
-
SHA1
c9eb6e94e8f11e023e524eea898c14e1084568ac
-
SHA256
14e1b5a22e7e68cfd1908bc0b7c6c7db1889c9109967bdd8fc06cd01ad3da042
-
SHA512
6c8b01d99e3a8fb4c1e4d671616abe4e523202aba8873ae2eecd92d4a5020330cdb1635344c846b8e8189fd3ecb15f98a2da907a89ab2d1ead5d14dc3af1689f
-
SSDEEP
768:vMi7NoXNEbgnMpOMb9anqNiAvHzFN9pPOphISv4:H7NQObjAnqNiAvTFN9pPOpjv4
Behavioral task
behavioral1
Sample
XvcClient.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
cities-annex.gl.at.ply.gg:28648
ZcxxP7wB83cGDNRX
-
Install_directory
%Userprofile%
-
install_file
msconfig.exe
Targets
-
-
Target
XvcClient.exe
-
Size
39KB
-
MD5
8a1f910de42bbdfc2967424952092c93
-
SHA1
c9eb6e94e8f11e023e524eea898c14e1084568ac
-
SHA256
14e1b5a22e7e68cfd1908bc0b7c6c7db1889c9109967bdd8fc06cd01ad3da042
-
SHA512
6c8b01d99e3a8fb4c1e4d671616abe4e523202aba8873ae2eecd92d4a5020330cdb1635344c846b8e8189fd3ecb15f98a2da907a89ab2d1ead5d14dc3af1689f
-
SSDEEP
768:vMi7NoXNEbgnMpOMb9anqNiAvHzFN9pPOphISv4:H7NQObjAnqNiAvTFN9pPOpjv4
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1