General

  • Target

    dialer.exe

  • Size

    41KB

  • MD5

    656b771ede5a289a0b0d024c8d3fe432

  • SHA1

    2775256eda18595bebadc0f950a23628b72bd19c

  • SHA256

    6e78a4acc47a3c9718aeb2e6c69985af8172ecc4b8d1101fb5369a9814221b9a

  • SHA512

    8524ee299fdb64c0a0c72909bdd79ddc5816409e71b8967ab638be5f9720351806cac3a81b1243c046d66416149daea9cc08b23caa4c4e7c58d39dabb051e97b

  • SSDEEP

    768:caR6zz3f4Mx7pE7C7RStyJ/kRpKLrsmhLOWcpR:F63PR+fKp1OBf

Score
10/10

Malware Config

Extracted

Family

xworm

C2

born-brandon.gl.at.ply.gg:55020

Mutex

aFcgqPgyGHfzwWGh

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • dialer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections