General

  • Target

    Stand.Launcher.exe

  • Size

    96KB

  • MD5

    9e662e34497d24b21edd594b5ffff5c3

  • SHA1

    caf741e65003fad07a0a95d76a643e23f09f43c1

  • SHA256

    5cddd5bdea27e62bd1c0d5a9fca1217faf722b2f5d7ebbe9c1b5757a2cf20748

  • SHA512

    ef340effb378e40c2d4a19f32c91b9f2bd312f0faf8f9e18cbe45b2f81e364edbd3707c0e7c318862cbdf41bf14d51fe6c8c81214145ff8007670092cd03337d

  • SSDEEP

    1536:DYB1Jo25r4g/aSMMfcsVkNE2ETfPblD3GUibFy6OWiOjvJIpNNs3:D81y64rSOsV7JLPblD3ChGOjvGX23

Score
10/10

Malware Config

Extracted

Family

xworm

C2

2.tcp.ngrok.io:17161

Attributes
  • install_file

    USB.exe

Signatures

  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Stand.Launcher.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections