General

  • Target

    loader.exe

  • Size

    67KB

  • MD5

    f76537270ebe15b28a49ad8bb379c205

  • SHA1

    43c0134adb284da2ef7fe759c1be9db949ea762d

  • SHA256

    4facb5d788e5dd31d146a0689ae7bd6e049dcd8ebdba0f924fd0c64fcd68f6f6

  • SHA512

    acde9a8ebb5532d699592e0babbe856eab1fd32b9cff9f94dc4cb730ddcbb0b5bf439f17c0185cd643a1111813831012280d607fbcab1c6415c9127bd42ba702

  • SSDEEP

    1536:LWXXdgxTxt5XdGdS3PVlM4paR4b6B+wPZ6QAimO3iXLnsE:gXQPA8VGyb6B3xmOSXLsE

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:16333

0.tcp.eu.ngrok.io:16333

Attributes
  • Install_directory

    %Temp%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • loader.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections