General

  • Target

    XerClient.exe

  • Size

    115KB

  • MD5

    43688d5920248d6e05b41fc7d86e2bc4

  • SHA1

    0a78843638a4e970142b7ad79d923952871d07eb

  • SHA256

    0e348eed7b70c100362fbec1db2b0f02b5e77997cccbb74dae722c3310260e11

  • SHA512

    af00d2147eccd7eb5ce756f4dea67aa50c5f2025750dd27852369ec5672e4130a68039cb82d07011faf7603e7fca09a056e2efc69e35efddd032fd5b0e71f298

  • SSDEEP

    3072:pT/j65K3274DuHD7F4bkvgOY+8WUU+0h1xt62CXH/iD6:p6MGyuj7ebJ+8tz9XS

Score
10/10

Malware Config

Extracted

Family

xworm

C2

0.tcp.eu.ngrok.io:13966

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XerClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections