Resubmissions

14/07/2024, 12:43

240714-pycsmstare 10

14/07/2024, 12:42

240714-pxlddstanh 10

14/07/2024, 12:40

240714-pv6asazhqp 10

14/07/2024, 12:22

240714-pkep3szemm 10

General

  • Target

    FusionHub.exe

  • Size

    154KB

  • MD5

    3fbcb0156674772d7c60cb148576476a

  • SHA1

    19477ff8e8989e42ba35b5584d2503118de86297

  • SHA256

    bb5d6e65a15ec0b740249044a9e71df73abe09a48b8112be76fa6e7ea0d0e3e7

  • SHA512

    4ad5b18de0c0fce3ab585a3e238d1851c6a12db3be1b9468422ce072bbf5ad4e178d02f6414015807c1505bba7724173d2ea51bf1c23434a1eb57f22d0590b94

  • SSDEEP

    3072:CPiNybyLC0Hibp6FO4SRBz65/M6If+3Js+3JFkKeTna:CPiNrXCbYqRxBt25

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:31773

parents-desk.gl.at.ply.gg:31773

Attributes
  • Install_directory

    %AppData%

  • install_file

    Standoff2cheats.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • FusionHub.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections