General

  • Target

    spoofer.exe

  • Size

    58KB

  • MD5

    34e390063463ffa7709d63851321d1db

  • SHA1

    2fa1baacbbce1660e0434125980ead59001eee98

  • SHA256

    913cb8257d053c3fc41cee678dc4e8110591e942fcab061a2f1ce502579ba384

  • SHA512

    2d4ca3c9b576c426c93658c87f386453f25823081214d3fd1ed1e32ef3fb8b41ba53ab5efe06f4efb30d12455ead3be7619feaad97de98402a5d6df3b211c31a

  • SSDEEP

    768:YrsmuId8cVH4LyDGj1wx+9CQyndcXBofwQ6CAKkbXIa4iWhPqPsgOphCi4cth:uMnWYyw1rCQjXjQtkbXoiW0PJOpsihh

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:4545

Attributes
  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • spoofer.exe
    .exe windows:4 windows x86 arch:x86

    Password: 123

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections