General

  • Target

    TPB-Client-Recode.exe

  • Size

    34KB

  • MD5

    c10b10a146428de89b882b5119de599b

  • SHA1

    15d3692226b0f9c6bb9baa86e938c568fa13895d

  • SHA256

    254c4e905b2e9f3806bf1c007c11b8f1fed318df092e2f8813d79c5bc250a4af

  • SHA512

    b690a9b0a663e59ea3367b336a68c91b9145e11e661057891f8fa67e7f437642eed229ac0917593f3e926b0704a0f76e7049c26307e6ddc9daad4e46fab3eff3

  • SSDEEP

    384:xSyXlquOae6oKoBmoDnnGvBLmlyCwvHixdTD2VR8pkFTBLTIZwYGDcvw9Ikuiswo:kyXiBDAtYyC4CaV9FZ9j0OjhE/46

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

lefferek-42016.portmap.host:61672

budget-compiled.gl.at.ply.gg:61672

Mutex

OJQg9vI9dqWedUWm

Attributes
  • Install_directory

    %AppData%

  • install_file

    DiscordClient.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • TPB-Client-Recode.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections