General

  • Target

    PortCount.exe

  • Size

    72KB

  • MD5

    84bf1bad48c4ea407fb8d5f080bdfcba

  • SHA1

    cfa07b44804435278db73c59038f10dd9eec526f

  • SHA256

    aa3daa9044183fdddd26aa666da037906992cd6d5ab3c89d189078cc5887113f

  • SHA512

    bae4d0d53260b33cdf1f3f833f6e3b0d58db7573b28cb00c704ad5a47d83461bd8877cad4b9efe4ebb443a0290fb76abbcf86f3a848d8f464ebd2bd57e98fa09

  • SSDEEP

    1536:o0h6oNWojEoKOv8X2Y2HyTB+b5z3ih9ehqL6785O+bm+Pa:oMjim7m+b5CehSO+bmsa

Score
10/10

Malware Config

Extracted

Family

xworm

C2

exchange-extends.gl.at.ply.gg:45129

Attributes
  • Install_directory

    %AppData%

  • install_file

    RRStealer.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • PortCount.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections