General

  • Target

    COM Surrogate.exe

  • Size

    56KB

  • MD5

    d630076a81a54f9be10b445948be037a

  • SHA1

    b1dc7ff1fe7dbf7e0e6666a86cfa40fde5e39906

  • SHA256

    5c95cee65a2fbf29f3ae2cefbff0500f3f96f935b69d56377aa7d9af618e32d1

  • SHA512

    6a8ee1536c45812259851440dda661db07d4c64cadf36bd56635016621e81f46ed33be50f559247300885e3011018ef7ebcf5e4bea10f6b41c4a1c1a7e06597f

  • SSDEEP

    768:yB/Xz+KwAhKUCFFjSLv9UcQlWhwTF+bi0JT8tbE3SdXHx14w6LgFOJhBtwcawS+:y/yxGUcWB+eMabE3614w68FOJDaR+

Score
10/10

Malware Config

Extracted

Family

xworm

C2

redslide-36078.portmap.host:36078

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • COM Surrogate.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections