General

  • Target

    XClient.exe

  • Size

    82KB

  • MD5

    8666227cf52be96906cae4b89b765aa1

  • SHA1

    fb04e33382f8786ba138387fc7b77446a908f5a5

  • SHA256

    b6a0ad58bb9ff7256112b05bfef41fbe973b880c9712e219fabd03bca45f8e86

  • SHA512

    be7b334425b6d217d114009f494629db1c1b3548929136a7e251fb8512460d7da0f3f27908b85597651f04da2a260db72fa8fa56688d64b563f201e194d1b64b

  • SSDEEP

    1536:kHujod91PyelpEkGaldGod+bcTIgS6c6BXpkKuKOBBW5+PnUm:zjyTKQ9Ga5+bcThZ1uKO25Ab

Score
10/10

Malware Config

Extracted

Family

xworm

C2

hydraforce-45677.portmap.io:45677

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections