General

  • Target

    GNGNGNNGNGNGNNGNGNGNGNG.exe

  • Size

    58KB

  • MD5

    bef33d8c7a761003ba337283c5dd98f2

  • SHA1

    59da8f7508e387e95706419feec309081eb49a7d

  • SHA256

    8329c370eb5d1dad8b020e38652eca34e5bb3617326d8ed2d2b554f1065defb5

  • SHA512

    d8a17bfd15e32f60894def3e82315479794bde9c7d870e367792ee8aea1c1724224e272d846bb2f3b77ed42e12532d56ff5dfd076cc84dec26ec17e82da02582

  • SSDEEP

    1536:6HofoR1lURyZeJBv992z4ctEr82UbmD/4+8xhNSAtO24D:kofoR12J99mtETUbmnmO24D

Score
10/10

Malware Config

Extracted

Family

xworm

C2

web-yukon.gl.at.ply.gg:17223

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • GNGNGNNGNGNGNNGNGNGNGNG.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections