General

  • Target

    XClient.exe

  • Size

    38KB

  • MD5

    9fb5de34ac65600971c317be9ed28bd8

  • SHA1

    f4c04263ac3df9d3cb489c812d320f7d5813ab9d

  • SHA256

    88677334f83f3d93c74bc5c17685848e04ef5580d538fe3501d13d57b51b59d1

  • SHA512

    7c513c6465c6b4d1e3fbab0611e09f07c8c3b0badc87b77bc55bdea5232223858e54f52d11bde66732d5e62ab6389d3c1ccb0e0ee9c052b4867220dca9a7b288

  • SSDEEP

    768:ZFtVJhZprPHSECWbLG1KuuuEYEgefFWPC9356cOMhmay:ZFthZpLb3O1KuuPhFJ9356cOMQL

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:2763

Mutex

XHS4bi3joWRgEOcr

Attributes
  • Install_directory

    %AppData%

  • install_file

    solara.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections