General

  • Target

    weback.exe

  • Size

    180KB

  • MD5

    39817417d7cefb23489f1fc61a39a3cc

  • SHA1

    56c7e0996a3429609cd2da2004ff6dcdefff7fbd

  • SHA256

    2ad8239cf67d62f6b378d38926f1a4c9ded6f40333fb8feb1c55e21b8dc110f2

  • SHA512

    b656b751330c1eea14498bb7ce0c0c0ba378a091ce154fd3e23ee72a081042c6b631bf8f660de240caf8965f1819f3e7700a2b36726429cb6031e1db9572dde3

  • SSDEEP

    1536:V34i93f+ZOEbGNBUY1XVBbrBuZtFScxVSxpm8A0OtC8JX4x7Ea:r3f+7bG/jbrBuZtcJxYGOttC7Ea

Score
10/10

Malware Config

Extracted

Family

xworm

C2

192.168.1.54:4782

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    svchost.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • weback.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections