General
-
Target
1640-1133-0x0000000000400000-0x0000000000418000-memory.dmp
-
Size
96KB
-
Sample
240527-rgzl7agc29
-
MD5
3a99de03c808f84a362035c7889b0cb4
-
SHA1
c67696e6ebbfa8a08d2ae65f100181661110a16a
-
SHA256
52d236bb9279b08bd3377fe160657a01612c199eac535de96e25c56d9df38d8d
-
SHA512
fe2778ca4a58848a47ce41920e413c9aa0406b831d03c4f6037382a53e9da1d4725fc752ac82c66a053d9c55766a6edf0c2185ba7262525029dc6a2fbf1a7091
-
SSDEEP
1536:2lXMrkc312vjuf74yenCfZbw1pf22RLsCnGdOL44I0+Rp:XF27ufIgbwX2+LsCGdO84h+7
Behavioral task
behavioral1
Sample
1640-1133-0x0000000000400000-0x0000000000418000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1640-1133-0x0000000000400000-0x0000000000418000-memory.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
3.1
gamemodz.duckdns.org:7000
-
install_file
USB.exe
Targets
-
-
Target
1640-1133-0x0000000000400000-0x0000000000418000-memory.dmp
-
Size
96KB
-
MD5
3a99de03c808f84a362035c7889b0cb4
-
SHA1
c67696e6ebbfa8a08d2ae65f100181661110a16a
-
SHA256
52d236bb9279b08bd3377fe160657a01612c199eac535de96e25c56d9df38d8d
-
SHA512
fe2778ca4a58848a47ce41920e413c9aa0406b831d03c4f6037382a53e9da1d4725fc752ac82c66a053d9c55766a6edf0c2185ba7262525029dc6a2fbf1a7091
-
SSDEEP
1536:2lXMrkc312vjuf74yenCfZbw1pf22RLsCnGdOL44I0+Rp:XF27ufIgbwX2+LsCGdO84h+7
Score1/10 -