General

  • Target

    Raku Loggerexe.exe

  • Size

    173KB

  • MD5

    9bef0de02ed2484a0e31e6189cb5c662

  • SHA1

    07261e515796ff5d6785216a4431dc955c802821

  • SHA256

    20a79b6bc521e3882b8b0f143f8c0c15a3676f33efe2defb95272c2a3feff34b

  • SHA512

    cf389f6aa69071ac8127423265c63d249ba65a31588ae311aa7e772b9cd52fc68502f99e26ab95f8b0752fd1bf3217c7559a754e045eb2c0ade092ce65c69ed9

  • SSDEEP

    1536:RYPNV+vCwVXl9QrOaudpoff//qYba+1mtadAtO8duKTXEq:RMNBwVLQrOawEvBbLhoO8d7XEq

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:16888

0.tcp.in.ngrok.io:16888

Attributes
  • Install_directory

    %AppData%

  • install_file

    Araku Logger.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Raku Loggerexe.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections