General

  • Target

    tmp

  • Size

    75KB

  • MD5

    4c2a997fa2661fbfe14db1233b16364c

  • SHA1

    e48025dbd61de286e13b25b144bf4da5da62761a

  • SHA256

    c2a299f988158d07a573a21621b00b1577b7c232f91c1442ba30d272e4414c5d

  • SHA512

    529a26f4769c7be0986e16d8e0bf37632b7b723a3e8d9fa8bb3f9cc4d766bd4d24a802d6aa43fe4df85c23cd680b0188c7e1eaff443a30203b298ba916aa0a57

  • SSDEEP

    1536:pnqs5zV1jXp4csu1Pzs+AJKZbDjlnOl4KpqC3DOjFt/zN:Bn5nZJ/ZbnsWKpf3DOjHN

Score
10/10

Malware Config

Extracted

Family

xworm

Version

3.1

C2

needforrat.hopto.org:7000

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • tmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections