General

  • Target

    XClient.exe

  • Size

    60KB

  • MD5

    e00eb4d99924ad4aea95a067355ea304

  • SHA1

    f2fa4a9fa0ceeabc8bb8c43a4eea1cc29b23ad6d

  • SHA256

    f1fba328b1c8f589bbea317feffea94375a879221fbb95969887318bab328b1a

  • SHA512

    edffb43a5cf637e32b2acce0b679b94c79de55c0176d8ed5bc42d2cffe1250a7b7f1491f20fd81d44d6d8628bda036c1896a29e942d68d435e7722ca6865a2f4

  • SSDEEP

    768:7DgznApUoprVit3+yNpVCTLa4U54+bDssB6DxU2iArqf/60iRLzOx+ehDNTqc4Hb:7xNu3ZNLQOtbD96FjJK/6hPOx+e47

Score
10/10

Malware Config

Extracted

Family

xworm

C2

tcp://4.tcp.eu.ngrok.io:12454

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections