General

  • Target

    XClient.exe

  • Size

    68KB

  • MD5

    bbef54a59ea36793ad05b0bcbb652133

  • SHA1

    12676d4dcf18c01ed2c5e1767ba83c4e1cf1dcd7

  • SHA256

    2a8a7379db4f365c56eb1bbff392e2fe498f7d7679fd438dda2a27584f2cb3f7

  • SHA512

    4055f12f1453d8807f31071a3687b95ba85602cf0f511bb113bb41b1f665f90b16a4c07a18273611c8373281a55092d5c8ec1d55ec52b1e0cacc6904882ca23d

  • SSDEEP

    1536:LsDZItkZtICEL79dEappS+bY2v7u6nO3pkTTPWUo:MPtxejS+bY6DOZnl

Score
10/10

Malware Config

Extracted

Family

xworm

C2

hydraforce-54942.portmap.io:54942

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections