General

  • Target

    RyverV1.exe

  • Size

    34KB

  • MD5

    40dcb13aad89903202f4b9b3f7f0e540

  • SHA1

    dd2b289bafd1d8b4434829b1c840ddd42ed482cd

  • SHA256

    7cd33bcb83388587511f2742c413c1d92c1f0ccd4484796f3506e4e707272961

  • SHA512

    98031954a601d94e1a60360266b5cf2f9c8b6ca483a330d7fe4d1582c3704fd5847b1d38a34935bf25b50553f4acab0d4e947a10f691404cb09144633a4c3cd3

  • SSDEEP

    768:UtH6rNd7AtFPNhzIgtoFT9Fy9YcOjhg/JcB5:UtuNJyF0gto3Fy9YcOjKBcB5

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

192.168.68.71:7000

192.168.68.1:7000

Mutex

CzgNqDo2UQE0MivR

Attributes
  • Install_directory

    %AppData%

  • install_file

    Ryver Attach.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • RyverV1.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections