General

  • Target

    12333.exe

  • Size

    72KB

  • MD5

    2554e1b2a7e231579a3dc5a7ef73ad74

  • SHA1

    4c2ddcc5f5767faddcf993ecb844eb5a953447b4

  • SHA256

    a2244382b959f9f488973d88e1b621dbfb4471dff5611b2e73d42939fbc9c99f

  • SHA512

    1bd0ce3e20dee75cde52939cd598bf092579caea097aad262c2b7fad40bf62c4c3992ef17481f0fb930bec0d8b0cd861806794baf23f5fd8d5e067ac789885c2

  • SSDEEP

    1536:V1haBqJvZMBL75Zp+bVs9M5EU6whobjOQ3mMpt9iVegGe:VL/kDp+bVs9nuobjOm9pLAIe

Score
10/10

Malware Config

Extracted

Family

xworm

C2

0.tcp.jp.ngrok.io:17019

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 12333.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections