General

  • Target

    FlugerClient.exe

  • Size

    83KB

  • MD5

    9a607bcf926e3fa1032ab3df83fec563

  • SHA1

    cd505574e113e798ea3f385cafc09765951215ad

  • SHA256

    72fa8fc4af0fd95bb42c1970b2fe7aac9417e3e41faea0023ccd231e400cc714

  • SHA512

    7b7e4948afa68cbe017e5d99234c680c54b920a07a18b44111cb3293727f215e61016fd9176eab9e7d63ea7684e3e5223831780795d1da0a0097d0278a0d05c0

  • SSDEEP

    1536:3iuq7smm/9Js25uFEkdMeoqtUbyl10c48F6tZIoLPCy4sOJP/Ra0dS1EAd8IIE:dOGsguFEkueobbyl1uSlsOJP/wcgEA6E

Score
10/10

Malware Config

Extracted

Family

xworm

C2

none-zero.gl.at.ply.gg:44284

Attributes
  • Install_directory

    %AppData%

  • install_file

    VLoader.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • FlugerClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections