General

  • Target

    Database.exe

  • Size

    84KB

  • MD5

    30b03d648c5ec211387041525ba5b1ab

  • SHA1

    1324c4245891ae37e5339822e1aa8ff2aad09023

  • SHA256

    d5258b9911eb6d9d83487cc0ac798452fceeaf9409b79b4d5d48c66f8c74efe6

  • SHA512

    3c7422fc7fedd65f870bbd78edcc40d54448b7cdb6bb6cef10136df3c2bdb8065a911c0ec7697df86abc4f2017f777647f3ddde756cc26c800c2514a55f71021

  • SSDEEP

    1536:NnD4Pu7/bA9LgBNbBXIBbop35fXGdeBUR6cGlFwB4uoOPzUV+HOV:ZD4i/c5gB/Ebk3bFwB4uoOTuV

Score
10/10

Malware Config

Extracted

Family

xworm

C2

tr3.localto.net:44953

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot6919369290:AAGnnKr1Yo67mV9jYUriuVi-XAno2tdvbq0

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Database.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections