General

  • Target

    budnle.exe

  • Size

    79KB

  • MD5

    ca9ac8474d1be228607a1df09b63b18c

  • SHA1

    87696c18a9ed5a11428101fd0ac50676ea8a1249

  • SHA256

    febfaa909b04a683ca6f8047c2ff356a144409212841e1b839ab19182776780b

  • SHA512

    1dff3d29e222960ad316d1b0320942e13e43157d32de9694d89f0a7953dc327042ee201ddf9c4c15234b6bf9f98961e1bfe24e9bf95a69f23519ad6a78ecd2e5

  • SSDEEP

    1536:xbXXEtDNc3ZNzHbDp4ZARBqPnoMJO3qqiR4:9nEdNc3ZRbDmZARB3oOa/4

Score
10/10

Malware Config

Extracted

Family

xworm

C2

localhost:34704

127.0.0.1:34704

user-centre.gl.at.ply.gg:34704

Attributes
  • Install_directory

    %AppData%

  • install_file

    xdwdNotepad++.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • budnle.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections