General
-
Target
XWorm V5.2.rar
-
Size
30.2MB
-
Sample
241230-bwbkxatlaq
-
MD5
d46700f59429076e678aa91993165c4d
-
SHA1
86e9e091021d1c87eb32a406261063362fc7aa0f
-
SHA256
ba02819b258dd8fb8d5a649d45535189d3dd19e15ca12aa2ccc83bc2162ad0c4
-
SHA512
b265ab5797b350bdee2798784eea56fa5d6ddccbc230ca3d8fb3874748a423a7ac292721a7259e03de1a055ad4bb1f381b32535882a4f52341184ec78baa636b
-
SSDEEP
786432:AyEdI35cJuWL9qeVCp3K7cLpeEJfi2I7auNJuaaJxyXzmn:AI35crZlVCphFrfi37HPnjmn
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
a0cFky9ZZ02qICjc
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
XWorm V5.2.rar
-
Size
30.2MB
-
MD5
d46700f59429076e678aa91993165c4d
-
SHA1
86e9e091021d1c87eb32a406261063362fc7aa0f
-
SHA256
ba02819b258dd8fb8d5a649d45535189d3dd19e15ca12aa2ccc83bc2162ad0c4
-
SHA512
b265ab5797b350bdee2798784eea56fa5d6ddccbc230ca3d8fb3874748a423a7ac292721a7259e03de1a055ad4bb1f381b32535882a4f52341184ec78baa636b
-
SSDEEP
786432:AyEdI35cJuWL9qeVCp3K7cLpeEJfi2I7auNJuaaJxyXzmn:AI35crZlVCphFrfi37HPnjmn
-
Detect Xworm Payload
-
Xworm family
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Uses the VBS compiler for execution
-