General

  • Target

    XClient.exe

  • Size

    255KB

  • MD5

    33927a48d1181eba4a4622fcbc4f49c2

  • SHA1

    b2122854cc6a69b10d1b855d1c025bb0c0d8db9d

  • SHA256

    da48d66dd7f8534f28c38df951b0979078e99409ba08ae84adca7d16c42ddebc

  • SHA512

    d37930d2f13738fe10568f6edcb62bfffc024a07d834e3cd5d34f68f27618d89ff078ba68195ecb0819f4e441d3778a59005c35d66e0ad3cf56c577e8470ae5e

  • SSDEEP

    6144:ZlyLyb9oZ8+T6yzRVd3up9SRBU7s1HQEf7AOi/Opuu1E0YaHO5:qn8+TtzRIEEOu

Score
10/10

Malware Config

Extracted

Family

xworm

C2

custom-authentication.gl.at.ply.gg:50023

Attributes
  • Install_directory

    %AppData%

  • install_file

    BetterRoblox.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections