General

  • Target

    317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe

  • Size

    324KB

  • MD5

    f60edabee0df313d9bd92cbec28e5b90

  • SHA1

    a786c8938c83656ed690c2a104ca4cd4838065ab

  • SHA256

    317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9

  • SHA512

    f043922cd08e6aeb160f4022a60d222d6567cff74c3c8cec952ef293412c70ae0243deac1b07781e96be5124e33cac7294fb87af89f956541040a902995c4918

  • SSDEEP

    768:Ohm7Omh+D1DT3QVYA82vJ6lEbFEPG9pHZ6vOChSzYi34Npp6uBRpeT:OhALh+g+EF19VZ6vOCw5oNpp65T

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:6414

fixed-execution.gl.at.ply.gg:6414

Mutex

0eMY5b21feXBm85M

Attributes
  • Install_directory

    %Temp%

  • install_file

    Discord.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 317c57e4052e0e8898e68b2ae9118855e953c2efb6b2ea841e4d2d5e16d7f7b9_NeikiAnalytics.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections