General

  • Target

    kikkk.exe

  • Size

    61KB

  • MD5

    8d6b8870f2ae7e75203261f2ab8532e9

  • SHA1

    bb0298b3c87786f42010521b7905ff189d42ff5c

  • SHA256

    03230b89ee6df330535ba769b7c0d457f4c8c369d164b9d5e54be1639ecbe78f

  • SHA512

    5db1c460e604f77bfdec73658271730749b46dbd00828124b4e48f75612876d5db5cb721f7d1d484be0480f5034bc31aed0d44495c72bd1e90d1e2a0e74c55f8

  • SSDEEP

    1536:cGzNDemyxGXE4fap9bIFiNN6AOb3Kt5ro:cMN8xGKXbIUhOLKt1o

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:10857

5.tcp.eu.ngrok.io:10857

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • kikkk.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections