General

  • Target

    XClient.exe

  • Size

    83KB

  • MD5

    0b54bc2012f540af4dae785f167a12b5

  • SHA1

    edea87e85a61988e982d6ce58f305ee639743921

  • SHA256

    27331ef02e361b5b5172e12f13aef887e68792214324b217aed7c3b3315721b2

  • SHA512

    b1bd1233ba77f0f2de5942b0d54b4c48e3e1c0b0da303c55d598f3ea8985f0950cc16d3b2564fabd7da4f51e0f6627bdcd5612195dcb3d82d4c8f58a9a7a9bfa

  • SSDEEP

    1536:zxQl9TOP28LMqQfYzRxbgqRT3VaKCVQ69fp5xBOSJwHijK6i:z4T8L4fYzRxbHxFdCpjOBCi

Score
10/10

Malware Config

Extracted

Family

xworm

C2

hydraforce-59762.portmap.host:59762

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections