General

  • Target

    spoofer-unlink.exe

  • Size

    70KB

  • MD5

    cdb32f86f7f575b892bedcfc86613fbc

  • SHA1

    adc2d700b2b2495d67e187514afe7eb356bc1f8e

  • SHA256

    c64a2ce6876188acd8aeae54faf79ab1d8377be03eb4ae7c576f3e3c6c435503

  • SHA512

    17cbf746ec33ae75075c339511d37bc56eb2c15bd96f609b6da8e2610a4247da76ef3c5067c50a819ce287e12f20e664a4adf260b1494ea474d18513194004de

  • SSDEEP

    1536:Y4BUbDSY42enpFdh1MMghOmLdJEbIA9+Q/H60OOFsd72t:3Uyrzdh1MHImLvEbI4xOOFs0t

Score
10/10

Malware Config

Extracted

Family

xworm

Version

3.1

C2

5.tcp.eu.ngrok.io:10157

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • spoofer-unlink.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections