General

  • Target

    XClient.exe

  • Size

    230KB

  • MD5

    d3ff75627ac85265b84125236fcbb483

  • SHA1

    a0269db515d7522dc22275de17e2971ae7ac670f

  • SHA256

    7bfad85091bf2df389fa8549b194979e5e9c62dbe55fb3467c5cb23e1892317e

  • SHA512

    09a84c82e320ce459bcd5447fd43785cfc30dfd71e4ba6fc3168b5963dc465f62404f92d479b6d88a7cb5743a4fe35b788c8fa27e17c244180c55409b92853ac

  • SSDEEP

    6144:GwwgUebyDOsUhcX7elbKTua9bfF/H9d9n:iDn3X3u+

Score
10/10

Malware Config

Extracted

Family

xworm

C2

north-untitled.gl.at.ply.gg:29298

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    discord.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections