General

  • Target

    spoofer.exe

  • Size

    40KB

  • MD5

    2ccbbb7f2af66fc4bd680559739275ba

  • SHA1

    e47f03c26b18a1190645b84447af9695e2d231f4

  • SHA256

    84d0c48ad44c5fc77e72d3b0ac2745d483ed4bd3c7018a1625b1bcf8421e8203

  • SHA512

    25e25fbd3ed3e751ffac5bb502e6c81f79009588df1751f9dc89607be95c8b9a8e072e841c52302dcab528d603a7cc165fa94867d98317b81b614824eae29c7d

  • SSDEEP

    768:0wbx9jxyPzDACSAWPTOmpTtF5Pc9I6wOMht3Edsud:Px9d+zMFAWPTNTFq9I6wOM3Yld

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

https://60d2-109-103-52-164:4040

https://3f10-109-103-52-164:4040

Mutex

jQvq2SHYIjuHEB67

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • spoofer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections