General

  • Target

    FMk.exe

  • Size

    318KB

  • MD5

    a1b0e83d06940e4a4b52251bf6beecab

  • SHA1

    65e1bb5e73662f4c30007edce1178f5a019c7374

  • SHA256

    0f2a86a9be93eb82f1ca1df755cf74b109eca66d14c0cb4e0a377ffb3bed0e09

  • SHA512

    31f2ba8b4153b5e8ec74c1ed23c27163a7ffdc0de0bd1bd49acc745844364a1a15c3f6c0581a8111913b7ee3da3042e007c36c382e746785278027d0d4d629c4

  • SSDEEP

    6144:yMC8N1bpgZ+GIIIIIIIhIIIIIIIIIIIIIIIU:tZqS

Score
10/10

Malware Config

Extracted

Family

xworm

C2

0.tcp.ngrok.io:12174

Attributes
  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • FMk.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections