General

  • Target

    Spoofer.exe

  • Size

    41KB

  • MD5

    2f4ca307258ae563184daf972c15fb0a

  • SHA1

    96cbe29b137169078a20146813a88f5bf81a5777

  • SHA256

    50dca1cac2d6272aced9796fb20eb7e6089890d4220a4032b806c94738657eee

  • SHA512

    40456901078b96eded2661268fcd2d857c03c4f70d0828523344bdba03b18c99566ed6220cbb34c1b72dfd12ae53a0f0da4431e6a526a6fa455bdc88cf7bf3f8

  • SSDEEP

    768:R3rEDwFw2HNngww8/Km4jCC1UA0R+nJF5Pn9pVS6vOwh/3shU:RYDwFbeww8/KhmUHHJFx9TS6vOwBsC

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:1608

80.89.229.216:1608

Mutex

wR0I7D1upbdIExt3

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Spoofer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections