General

  • Target

    XClient.exe

  • Size

    77KB

  • MD5

    ef4458792b0cb6ac36ec855d8fa22746

  • SHA1

    0b1df777312b444dc0fecc83a2961d8184424f29

  • SHA256

    378d29703f868965fb7f302df6ba41c86d082457cf1d1ac4a3a03439667ddb8b

  • SHA512

    14eaaf133c1a9e863b644962ae48b9c1d46529d8919ef286ca07ee8cc142b28d0bb49683cf85110953f4ca6476415e0286421d2e931b5e259a6cc1b1e6a5ab65

  • SSDEEP

    1536:cnEvrcA42wxrCQBvHbzaRnbkEKTwYR564OXHKG2:gQQWbkPw6DOXN2

Score
10/10

Malware Config

Extracted

Family

xworm

C2

moving-agenda.gl.at.ply.gg:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    conhost.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections