General

  • Target

    XClient.exe

  • Size

    183KB

  • MD5

    2b2588dbc679d917268e4ec17783db91

  • SHA1

    5d3d9b5e548972155ebf7fb8506eeb87ee8d1c85

  • SHA256

    a089baba4b046b231c5008343025b97f47bab795bdebd0fb47c608053ba4d8b8

  • SHA512

    11615bbf4477ad683b5cfd5ecf1fbffb7ec957a76b47c012de67f7540ac26b42e63c965cbc028da9430a43f340b4889c5b80de416f83364d6b8d1783c41f4c86

  • SSDEEP

    3072:JMf71a4l72Me/sigR1b60M7MDVOyFMgBz65/M6If+3Js+3JFkKeTno:JyPrbjM7KxBt25

Score
10/10

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    Spoofer.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections