General

  • Target

    rekz.exe

  • Size

    51KB

  • MD5

    99116e57feb2818d7e64e9f4a51ec601

  • SHA1

    a10d8277588982816ec9d41e0dfe66962b80adcf

  • SHA256

    759bde9c2ba4b4b5b71711e53a977af68f42c8e45944eaa72b34749d37f96f8f

  • SHA512

    f65cf487b6d9ef1e2ca4a321ec434610592f148a65b77ae3ac23e023244862db353c7b5b5dbdbf0e5ca6faebb437aa455ce9081e8546fcc3728a012e668824db

  • SSDEEP

    1536:Y4DweQldSgDIgXvvgcFI9Af6vOwW9zdS1EAd8II8:Y4DweeSgDXvvgcFI9A2OwagEA6II8

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

147.185.221.23:49592:7000

Mutex

AaKOzkq2FwZmFPLZ

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • rekz.exe
    .exe windows:4 windows x86 arch:x86

    Password: 123

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections