General

  • Target

    bL4B.exe

  • Size

    59KB

  • MD5

    38dac2d34f499f649daf32e91097da5a

  • SHA1

    9c00c3b2163fa27b68f62366e02c68aec60f2ea5

  • SHA256

    d9c88ab29f40ca6865aa0b0a99e8fe0ad9e00d57c88e084e94d70bf2ecf53b62

  • SHA512

    ed7db87e55c68fa768a31005788804b00d7433ac6e1e4bd0dd36991695546659a60bc94a6fc87d8a13dd425d6bb3e52e4e24104bd773b674d2e2c05814d292ac

  • SSDEEP

    768:1ziB2eYBrG86acGQ3Ely+6wPYZ/tbh6d2bjrd3XDZbP0itDuevOkshBuodbfgTz:1ziE7iPguzrljblDZbP0itPvOpJI/

Score
10/10

Malware Config

Extracted

Family

xworm

Version

3.1

C2

0.tcp.ap.ngrok.io:18448

Attributes
  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bL4B.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections