General

  • Target

    dialer.exe

  • Size

    41KB

  • MD5

    e79d57be54adcf4f772192e446648a09

  • SHA1

    e1ab515fed01ed5684deb4670311e70642bab047

  • SHA256

    6069e35048f548a08c90fbd22b1f68adb7cf873140870d621c08e510ad28528e

  • SHA512

    9778abea04a7aea7391c4aeb97b4c757885a20aa0dd9b4863b8a0084efac6b67e9fc3fbc07e60c79ea2bba4150983b725e5dda75a3670cf9dbfce11d93a34a48

  • SSDEEP

    768:dEtR6jfNapAz6/JO7u7RStyJ/kRpK7rsmhLOAcpe:Cz67z6/4zKZ1OjY

Score
10/10

Malware Config

Extracted

Family

xworm

C2

looking-memphis.gl.at.ply.gg:45119

Mutex

wB7ggAfZNILHr908

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • dialer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections