General

  • Target

    XClient.exe

  • Size

    46KB

  • MD5

    2863622641c5c61db1e4bb529087bcd7

  • SHA1

    fde029435480c6f74cfeed1a0b59f4d0edd21224

  • SHA256

    1d2ff226113b1df03a147eaa0c896096a893a1f330d3176dc527e600ca897051

  • SHA512

    c999ef316613b356fd7f083bd3866b7034282ef2abafa1134a8fbc9bb342f33dbdd7582db7d6f99b6f0be696dd8602ffb6267aad81555e29d0039bf830435152

  • SSDEEP

    768:CPyEHgnJN3nBQdLw4mMufoqt23P0N/7aM1eY7jFEPa9eib6iOCh7zgiW4:itHS6m4fAaveFJ9nb6iOCtBW4

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

https://pastebin.com/raw/wrkuHfrq:123456789

Mutex

jwyqp1hvWrehlcVz

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    Raketka.exe

  • pastebin_url

    https://pastebin.com/raw/wrkuHfrq

  • telegram

    https://api.telegram.org/bot7182610893:AAHBtNIrJfM5ew_EbHDwB8zi4gEiJCLGR68/sendMessage?chat_id=123456789

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XClient.exe
    .exe windows:4 windows x86 arch:x86

    Password: Orbitchel_221_

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections