General

  • Target

    solarka.exe

  • Size

    65KB

  • MD5

    b0c354614759bcb78161a0856fe38b51

  • SHA1

    b392f0fdd94b3d29626ee8dccdfc044e711b2fda

  • SHA256

    ac7763d07b0cffa2c4c93ad9bf575431d13dee0cde6b92e8b60cf27743ac689d

  • SHA512

    ab051bc4a82500203f625f89a7ec952984e26bb344a6c81d0a58acd793c9ce1aae7475f18cc005e0ac9f16b0f3b7ecd8a9b0ace4718e679806073d82194e06ef

  • SSDEEP

    1536:wZD0L4xdm0olrYyufb+ZeaJqy+GCuwwOYwqZyVLB:CFxU0o5YyufbkeXG7wwOYpZydB

Score
10/10

Malware Config

Extracted

Family

xworm

C2

third-reminder.gl.at.ply.gg:55573

Attributes
  • Install_directory

    %AppData%

  • install_file

    hentai.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • solarka.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections