General
-
Target
3024-7-0x0000000000400000-0x000000000041C000-memory.dmp
-
Size
112KB
-
Sample
240701-regnlawale
-
MD5
961b888b3e4ac7a62ca8bf9f42000b51
-
SHA1
20ae46e981c0d51b69d25fc144f84ffc342bec38
-
SHA256
9f01eb129e9c8e49143b3e431d07494ea9f11ea6dc7bf69d494aba16101b07f2
-
SHA512
75bb0b312b2cf57479675434bb0c2365991e6c2901c71d14282ae3a52475242cf0f07d9aa144a425c4ddf23aed7258c026880615516b28d4d7739013b8ad37ee
-
SSDEEP
1536:67mW/PHFPZnnBT++3PVfVEdxwJbozmSHaB6h4z6hOwO9SK01Klz6m:67lPHXnBTpPVfVyeJbDLB6hfO3uqGm
Behavioral task
behavioral1
Sample
3024-7-0x0000000000400000-0x000000000041C000-memory.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3024-7-0x0000000000400000-0x000000000041C000-memory.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
xworm
3.1
rwanco.duckdns.org:1556
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
3024-7-0x0000000000400000-0x000000000041C000-memory.dmp
-
Size
112KB
-
MD5
961b888b3e4ac7a62ca8bf9f42000b51
-
SHA1
20ae46e981c0d51b69d25fc144f84ffc342bec38
-
SHA256
9f01eb129e9c8e49143b3e431d07494ea9f11ea6dc7bf69d494aba16101b07f2
-
SHA512
75bb0b312b2cf57479675434bb0c2365991e6c2901c71d14282ae3a52475242cf0f07d9aa144a425c4ddf23aed7258c026880615516b28d4d7739013b8ad37ee
-
SSDEEP
1536:67mW/PHFPZnnBT++3PVfVEdxwJbozmSHaB6h4z6hOwO9SK01Klz6m:67lPHXnBTpPVfVyeJbDLB6hfO3uqGm
Score1/10 -