General

  • Target

    XClientRBX.exe

  • Size

    179KB

  • MD5

    73e940aa349cfe2ca518e9d2ca4d9064

  • SHA1

    a64f91fe016d2e24b46e3ac65f194c11404ff5e4

  • SHA256

    a8e8929aa659e4cbbe3c6ac2efe57222999e579abab2f4d3ff6b06c9fc80ffa4

  • SHA512

    8852f969e3923cb80078e955151c83af16d7f80cf4d1e38981db784f71436cb3dc42bffc58a60e1615c0d931d91aae37de3eb26d22f6aa3934599edc70d83c0b

  • SSDEEP

    3072:nxmf4KVaLbYRRoswaKPnOJseSfe295liNgTddwY0JwsR4TbswYqkX5bEdGDOjESq:MQLb+iEK0SH95D

Score
10/10

Malware Config

Extracted

Family

xworm

C2

21.ip.gl.ply.gg:49171

Attributes
  • Install_directory

    %AppData%

  • install_file

    BetterRoblox.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XClientRBX.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections