General

  • Target

    yuki.exe

  • Size

    71KB

  • MD5

    265c9a9628d5f12c50e30ed2bfa714f1

  • SHA1

    e1af42eddb9d02ef3b18aded09d40b311dab9c73

  • SHA256

    9885d377720a98e28de93faee6d6fe7476be031a628eae384819f4d67a6cb1f4

  • SHA512

    551e10e38c59c98b11dc7485ecbe5728c9d479863d8c583e77fdfdd5c5cf46b9763001a59d68a1c859c16de075ce572f6aa2ae3ef13081e8482e866b9616eccb

  • SSDEEP

    1536:XAo9pHwattylONng4NbE1Dwna/S+6Ak+wTOgcR13R63:XAoYYSORhNbETKwsTO5R103

Score
10/10

Malware Config

Extracted

Family

xworm

C2

45.88.90.228:7000

178.215.236.228:7000

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    svchost.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • yuki.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections