General

  • Target

    XClient2.exe

  • Size

    64KB

  • MD5

    e66a8a816dcbcb8a6dd2396c8021cc67

  • SHA1

    37f68e19dafa7d0f4d48f6babfc24d0eb5cdd1f5

  • SHA256

    7737c24eeb536fc80721b44991bad3abb37cb635af639f5c94c20d661e6ab3d0

  • SHA512

    580945c01a582fb685e89d6840ceb488cdbeea7cc04ea9b74a29216865ae15e310c094d0389f49e8209f779ee0391c13454c5ede6037b8768c8904154e6222ee

  • SSDEEP

    1536:Ds1ex9jnodRhYwvytRv3bKV5q0DbAL2VpbNsag61IOPWTFA:zxoRhKtBr4o8bAcZIOPWBA

Score
10/10

Malware Config

Extracted

Family

xworm

C2

keep-motors.gl.at.ply.gg:2646

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • XClient2.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections