General

  • Target

    bootstrapper.exe

  • Size

    33KB

  • MD5

    01148319be9a54a165bf44620bbe211b

  • SHA1

    800bef6e8365dbc9eb68c825f5b961f06da257b5

  • SHA256

    15c221467ad32d7cbcdeb41674b5701ef155694c420075f7c953b63f5663d253

  • SHA512

    1486dae32b0972ee6c6af10275c3b75c2709448d7b11a4b58b5c041e9d2dd6e1d35f51c5292ffbf0dbc2cd62c1b23aee68dc50abaf6780893c55ece4ac6a2bd7

  • SSDEEP

    768:OqJluIYWuThDo23/nWcF+9HtGO/h1//+k:VJ8ZW4Do2PnFF+9H0O/ruk

Score
10/10

Malware Config

Extracted

Family

xworm

C2

prior-ks.gl.at.ply.gg:31476

Mutex

v3dd7C15JKMfEypt

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bootstrapper.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections