General

  • Target

    dialer.exe

  • Size

    47KB

  • MD5

    2530728c6d8aeca0eb4bec64aa90b7cb

  • SHA1

    c580e1636ba8db813c60c4e0a8b5489bc384656b

  • SHA256

    50a144b147bc8f85337ee152b0868b629f3ee81f744107a83a912198837572a6

  • SHA512

    cd1d46bc0ef6c9e2adea88e7ce0cac26ce06fedc646400e02ac80be2a4aa013c601a49b1f8cfe96d6c166818af1d17353bb0fbcd3ced14f9ef1df3dbb724148f

  • SSDEEP

    768:K1OJkJKa3MiJBDBboCTjJXHRrHiQPLx9Q6iPmhLOG1gXd:5kUojUWxLjx9QQ1OPXd

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:8989

Mutex

ocvo60pDWm15sGef

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • dialer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections