General

  • Target

    4736-2-0x0000000000400000-0x000000000042C000-memory.dmp

  • Size

    176KB

  • MD5

    e44d5af0dd605315fbae2ae479410e15

  • SHA1

    7c877d8f82ca3308ccf5f18534cf52a08ad65808

  • SHA256

    87f8ee2b5e61849bd27020d39fda3773ef32a1d1db0da985d140df9fef46280c

  • SHA512

    20f869211de41f9db6facd356bc029b33c45980dd5d13612c69bdb5bee42695935914210e3b52003250a6200c3baa4c6ff5ac821ede41cab398bee2fb99a11c1

  • SSDEEP

    3072:tcickyglTPyn/a4ud65snkSeHTt74EHFdMWKwEKptHSwQP:q/MhnkSeHTt74EHFdMWrEKDh

Score
10/10

Malware Config

Extracted

Family

xehook

Version

2.1.5 Stable

C2

https://ussrconnect.ru/

https://c0nnect1ng.ru/

https://vodkaenjoy.ru/

Attributes
  • id

    108

  • token

    xehook108709660

Signatures

  • Detect Xehook Payload 1 IoCs
  • Xehook family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4736-2-0x0000000000400000-0x000000000042C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections