General
-
Target
XClient.exe
-
Size
156KB
-
Sample
250307-bk12es1vet
-
MD5
49acade22394e1ad05b0a24ad2461d44
-
SHA1
2cc67fe90f60f39918de6e02755756d04a9ea6a6
-
SHA256
3394a84609088b9e0cc8e0e9df4c9f1c94f6fda2efc10164eef27bec071372e3
-
SHA512
f7b85b6594dbd5db200810c563a2de3a8be6c9d1b9796ee2b7c856fe1747b54cc467d23a2c15120368e2155c490788c3964c1515990cab4a930f59f67adfdd87
-
SSDEEP
1536:WRWZt9DWl8i9ko6zbQ8v/niOiN/NHERafjVm:kst08iWo6zbQ8yOiNVHEoY
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
3.1
places-y.gl.at.ply.gg:45473
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
XClient.exe
-
Size
156KB
-
MD5
49acade22394e1ad05b0a24ad2461d44
-
SHA1
2cc67fe90f60f39918de6e02755756d04a9ea6a6
-
SHA256
3394a84609088b9e0cc8e0e9df4c9f1c94f6fda2efc10164eef27bec071372e3
-
SHA512
f7b85b6594dbd5db200810c563a2de3a8be6c9d1b9796ee2b7c856fe1747b54cc467d23a2c15120368e2155c490788c3964c1515990cab4a930f59f67adfdd87
-
SSDEEP
1536:WRWZt9DWl8i9ko6zbQ8v/niOiN/NHERafjVm:kst08iWo6zbQ8yOiNVHEoY
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1