General

  • Target

    Ragnarok.exe

  • Size

    71KB

  • MD5

    871f5ec58f0e3086fdccc877a7baae5d

  • SHA1

    22036d5d3ebcb7d7a6c87e021198642ed081e299

  • SHA256

    c1e1442f1a4b2c4b3d6b1a5f15c6039a0e531c3db3a4e97dea89e1eb98708df4

  • SHA512

    e56985ca26042faca6fa170af5db1b5187990ffab5c6d39bf63999d3f1da2281f873a5b999795e7766f0d99eb05ba42161df4ef2dd46da4d23b1092026677dc7

  • SSDEEP

    1536:0i2BN6LRRM6YDpEOCgMqV0mVZW/F+b4wypLiy+4NZECUvOBXFws:Z2P6LRvpOCgpul9+b4wK+MEXOBXKs

Score
10/10

Malware Config

Extracted

Family

xworm

C2

posted-channels.gl.at.ply.gg:38837

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Ragnarok.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections