General

  • Target

    spoofer.exe

  • Size

    71KB

  • MD5

    e0d19232af4f6544d373d69ee1eba1c6

  • SHA1

    1ccd5612b8bf9a692ae1135043d4008f1ce8c003

  • SHA256

    686aa720a370e48470522d91c4f07c94b3d40bc483e19dfa781d9f805baf821c

  • SHA512

    f9f139ed02936ad9ee3eda20ce1ea23bfd4f84c9904e0e5cae0af29a60d9a7bea62705f02aac3690e20d2d385bb1a60123e7983e90428070b524af3903c54b84

  • SSDEEP

    1536:aYxCEsbabm8Zbe/r3jJXGDbMCnobUMUXchQtv1e6IYOCr3ox/:a83uGsxbUVmgKYOaA/

Score
10/10

Malware Config

Extracted

Family

xworm

Version

3.1

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • spoofer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections