General

  • Target

    BootStrapper (1).exe

  • Size

    82KB

  • MD5

    0e053daa7f33031dee7bd642b9e53802

  • SHA1

    11ef2691bc84a1d85c773bc75075255236b53b9d

  • SHA256

    d60e0b54eaa7ee119c1303a61746b13e72dbb342feb113b2cfbec2853599fc80

  • SHA512

    693d729bf88dd6814ef4c27fa92bc685fc9ded8e3829d9a02581e075a370abdd83206f4f974773891d2253c1f9d31174176ecf1168527c23da88cf8c62794466

  • SSDEEP

    1536:H6Pys4EMbdO+PVqqtQ0f9dJYB1MbqCbb+tx6xvfZ8dOxaKmeD:HLJLbNqqL/61MbqQ+uvh+OxaKm4

Score
10/10

Malware Config

Extracted

Family

xworm

C2

147.185.221.26:16031

Attributes
  • Install_directory

    %AppData%

  • install_file

    Test.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • BootStrapper (1).exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections