General
-
Target
XClient.exe
-
Size
261KB
-
Sample
250302-zsrpqavnw6
-
MD5
731d3f9b7421abe1e0ca7648fc43de46
-
SHA1
9cc2166087313ab5a19635cfb08c5207032d8f3f
-
SHA256
8465b9c75257a7dabef1a0d339559dc6724c250078c2db6885cdd9057c6866e4
-
SHA512
140b55febd0453f7c687fba1ddbeca1e16a47550615a097afa138bbfd9b998edebffcdb851900781c92ce1b377a4a649b2ce4a85477d64a7185c3ef19f4afb49
-
SSDEEP
3072:kP7QWMkq0+G6OnNVJB5DQorRb80xtYFGTx9IFE3bVyTgs/jdrlRpPNxhC6bUq9bd:1vGrNAs80f/FnbMTgs/jplRJNf9b6hM
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
XClient.exe
-
Size
261KB
-
MD5
731d3f9b7421abe1e0ca7648fc43de46
-
SHA1
9cc2166087313ab5a19635cfb08c5207032d8f3f
-
SHA256
8465b9c75257a7dabef1a0d339559dc6724c250078c2db6885cdd9057c6866e4
-
SHA512
140b55febd0453f7c687fba1ddbeca1e16a47550615a097afa138bbfd9b998edebffcdb851900781c92ce1b377a4a649b2ce4a85477d64a7185c3ef19f4afb49
-
SSDEEP
3072:kP7QWMkq0+G6OnNVJB5DQorRb80xtYFGTx9IFE3bVyTgs/jdrlRpPNxhC6bUq9bd:1vGrNAs80f/FnbMTgs/jplRJNf9b6hM
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Legitimate hosting services abused for malware hosting/C2
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-