General

  • Target

    XClient.exe

  • Size

    36KB

  • MD5

    d933911e930f4bc4fade9c0b38973b46

  • SHA1

    ca693710a5a06d6252af4c382fafb942207ee40c

  • SHA256

    ae912278d3a8f440b7a0f27064659381b3ca9912fcd2e59ca7c4f51f4f9ccd01

  • SHA512

    921ef94df1b272699bc57746f91ba3f78df753a94e5b0ddb23ff2630475e680d45902b7230237ae045f7b900d6d056de2bbe81b52a9a1229bd00a2b1032be894

  • SSDEEP

    768:2TAJM/jPWzJzpw9FALFyn9CiBOjh6D2/:2EsjO+aFU9CSOj9

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

Jamalhacker-58528.portmap.host:58528

Mutex

ua7204bft5NVphsg

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections