General

  • Target

    GDsploit.exe

  • Size

    66KB

  • MD5

    086af6b9c81aed2f9eda0a82825487c7

  • SHA1

    e14efde39aa7d4009476fa4a7896a1b359e94840

  • SHA256

    44f7343d08b6c8d955d4dda81561133170285e11731a188346daedd83cc3c4d6

  • SHA512

    7406550b68978b679f99612a30441493c7b4786a1a1e50265523e86c4019ab60d8ca30038e92dd1b6ea7ae43a20a204436b1f7c74c9089b97db0d6d202b1854f

  • SSDEEP

    1536:gKvQ+hMlocMnxPbEgKGZMmK621OTKC2Iuatf:Zv89MnhbEOZu1OuC2Yf

Score
10/10

Malware Config

Extracted

Family

xworm

C2

147.185.221.22:37723

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • GDsploit.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections