General

  • Target

    celexdlol (1).rar

  • Size

    634KB

  • MD5

    9c502988a3c51eeaec26d08abaedb508

  • SHA1

    030fe0b43920c5293ac5c32eb41280de44743157

  • SHA256

    6e552c8d82a2553ec83fea57d340561834aeac22ae30d6a81692f2eee6651e14

  • SHA512

    3b84bd6a08d06547f180c583f587ee33b88848cd1f846afd0557501c5c486267cde218df5be37c818f5a2b1ccbbbfb391b859f7073bd6f92e2bfc1904f54347b

  • SSDEEP

    12288:Wzcn7EanlQiWtYhmJFSwUBLcQZfgipYedhDYedh0Yedhh:0cn7NlwPUdYQxYQCYQv

Score
10/10

Malware Config

Extracted

Family

xworm

C2

submit-processing.gl.at.ply.gg:54034

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 4 IoCs
  • Xworm family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Unsigned PE 4 IoCs

    Checks for missing Authenticode signature.

Files

  • celexdlol (1).rar
    .rar

    Password: Nigger

  • README.txt
  • cheat.exe
    .exe windows:4 windows x86 arch:x86

    Password: Nigger

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • dControl.exe
    .exe windows:5 windows x86 arch:x86

    Password: Nigger


    Code Sign

    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • dControl.ini
  • loader.exe
    .exe windows:4 windows x86 arch:x86

    Password: Nigger

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • map.exe
    .exe windows:4 windows x86 arch:x86

    Password: Nigger

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections