General
-
Target
11XClient.exe
-
Size
39KB
-
Sample
250124-w4eyhs1qbs
-
MD5
296a700a8f29a25171ba2178e75ec360
-
SHA1
9be9efc16e69b069122aadccc84771c8102f4e84
-
SHA256
56cdb12de6a7c58f2c6a11c3cac753cdea860ce37c8ff08c172d8151c29f6bdc
-
SHA512
47028edbd49bdcbaee1923a5e5b91532b94c7b2598275dedf9539bbf134ee70eceec36fed233e982e21b622a5a07e54d534444de89c69a7460c7237fa79f66d2
-
SSDEEP
768:LpbQys8WnicWVfT0qW5DjkNpnCQQ7FWPa9nEAOwhBaO8Q:LxY8WniZVfQR5/Fv9nJOw7T8Q
Behavioral task
behavioral1
Sample
11XClient.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
jenoks-52356.portmap.host:3675
osXgwikr6yf5nRvn
-
Install_directory
%AppData%
-
install_file
winconfig.exe
Targets
-
-
Target
11XClient.exe
-
Size
39KB
-
MD5
296a700a8f29a25171ba2178e75ec360
-
SHA1
9be9efc16e69b069122aadccc84771c8102f4e84
-
SHA256
56cdb12de6a7c58f2c6a11c3cac753cdea860ce37c8ff08c172d8151c29f6bdc
-
SHA512
47028edbd49bdcbaee1923a5e5b91532b94c7b2598275dedf9539bbf134ee70eceec36fed233e982e21b622a5a07e54d534444de89c69a7460c7237fa79f66d2
-
SSDEEP
768:LpbQys8WnicWVfT0qW5DjkNpnCQQ7FWPa9nEAOwhBaO8Q:LxY8WniZVfQR5/Fv9nJOw7T8Q
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1