General
-
Target
XClient.exe
-
Size
62KB
-
Sample
250306-1t3ztaytay
-
MD5
96fedf6b9bdef61b693c3c895e647ec9
-
SHA1
d75b1c6021af31f40414e892d9fdc16132df9a82
-
SHA256
aed72392c30af8bbd8d7d2978992fb0b499333741e799e1e14f285af74e3b9dc
-
SHA512
3fab7337d135387c5ee923960985b0c58c7c45ce34c97e7a984549e805f6ddc71bde72ba83f9473fd48c8cd380e3e75674a21e2250d7eccfdcae011caea73384
-
SSDEEP
1536:J4OZWBxEzUFdvJzJfvpX5+bLW+6NG+MOc8m+3R:2OABxucdBzJfvpJ+bL1+MOc8mQR
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
posted-channels.gl.at.ply.gg:38837
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
XClient.exe
-
Size
62KB
-
MD5
96fedf6b9bdef61b693c3c895e647ec9
-
SHA1
d75b1c6021af31f40414e892d9fdc16132df9a82
-
SHA256
aed72392c30af8bbd8d7d2978992fb0b499333741e799e1e14f285af74e3b9dc
-
SHA512
3fab7337d135387c5ee923960985b0c58c7c45ce34c97e7a984549e805f6ddc71bde72ba83f9473fd48c8cd380e3e75674a21e2250d7eccfdcae011caea73384
-
SSDEEP
1536:J4OZWBxEzUFdvJzJfvpX5+bLW+6NG+MOc8m+3R:2OABxucdBzJfvpJ+bL1+MOc8mQR
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1