General

  • Target

    DominantExecutor.exe

  • Size

    86KB

  • MD5

    fd2885ed926ad3eab3a480b168028fad

  • SHA1

    0234f70bcc1933665f9cd62d8890e6290bdef1e0

  • SHA256

    7044f7923fbd05a8208c97196319158dc84c52f1c37711458f202109dfdb1450

  • SHA512

    b53611fb91343fa239627b3dcefdaa1b09e74ff553bbb701a4c83f4e3139e3473ea2727af53f878675a13d020e9b89a41f909ad9c088a53d1f96908f6631a712

  • SSDEEP

    1536:ybMfVRjS0f7EEjwj0tjbGC0h4DNvc5hWOwaOBl3hQHD:ybNk00tjbGC0OcoOlOBl3WHD

Score
10/10

Malware Config

Extracted

Family

xworm

C2

screen-researcher.gl.at.ply.gg:20112

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • DominantExecutor.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections