General
-
Target
RyverV1.exe
-
Size
34KB
-
Sample
240608-pwj4yabg3y
-
MD5
40dcb13aad89903202f4b9b3f7f0e540
-
SHA1
dd2b289bafd1d8b4434829b1c840ddd42ed482cd
-
SHA256
7cd33bcb83388587511f2742c413c1d92c1f0ccd4484796f3506e4e707272961
-
SHA512
98031954a601d94e1a60360266b5cf2f9c8b6ca483a330d7fe4d1582c3704fd5847b1d38a34935bf25b50553f4acab0d4e947a10f691404cb09144633a4c3cd3
-
SSDEEP
768:UtH6rNd7AtFPNhzIgtoFT9Fy9YcOjhg/JcB5:UtuNJyF0gto3Fy9YcOjKBcB5
Behavioral task
behavioral1
Sample
RyverV1.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
5.0
192.168.68.71:7000
192.168.68.1:7000
CzgNqDo2UQE0MivR
-
Install_directory
%AppData%
-
install_file
Ryver Attach.exe
Targets
-
-
Target
RyverV1.exe
-
Size
34KB
-
MD5
40dcb13aad89903202f4b9b3f7f0e540
-
SHA1
dd2b289bafd1d8b4434829b1c840ddd42ed482cd
-
SHA256
7cd33bcb83388587511f2742c413c1d92c1f0ccd4484796f3506e4e707272961
-
SHA512
98031954a601d94e1a60360266b5cf2f9c8b6ca483a330d7fe4d1582c3704fd5847b1d38a34935bf25b50553f4acab0d4e947a10f691404cb09144633a4c3cd3
-
SSDEEP
768:UtH6rNd7AtFPNhzIgtoFT9Fy9YcOjhg/JcB5:UtuNJyF0gto3Fy9YcOjKBcB5
Score10/10-
Detect Xworm Payload
-
Drops startup file
-
Adds Run key to start application
-