General

  • Target

    XClient.exe

  • Size

    53KB

  • MD5

    a47f43c4552c5c418b7e690d61f0f694

  • SHA1

    d173599df9f683fb5b14fb4a1bff008250afd830

  • SHA256

    298b933ec37747307b498e7f2fda2ba46195cea6a5c92e228981388ca4ae2d29

  • SHA512

    7a102b03b7ae30d2f0c3a598230480a90a21ead1f6fefe3a9e171b5ec240eebf89565a924effa03a671a6dd37b18803801de947536a5b1ac1a2ec0175d1cdeac

  • SSDEEP

    768:PgqQl7sTCANFeOD0uFfX7ft/kbhwwi9Myhq6KYAvnbvOqhMl3pX:S5RAreSX79kbhwwiHhq6KYALOqS9

Score
10/10

Malware Config

Extracted

Family

xworm

C2

parents-roy.gl.at.ply.gg:13511

Attributes
  • Install_directory

    %AppData%

  • install_file

    PowerShell.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XClient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections