General

  • Target

    Rogalik.rar

  • Size

    38KB

  • MD5

    acdb81dfa526721958a7bf549ed69120

  • SHA1

    f732dfc2ee5298ef0029d8323599e4c45a9dd3e7

  • SHA256

    b5f0a756b0f993c300f0a3aaa32a682c930c8bec974b84cf01373e383c36b2ef

  • SHA512

    2cac1b33d4e6742b379bd839aeb63a0d48ac929152ca72278e3f83f6c53b236bb5a4720ead38d2b7e03d99fc3cda1f3caed7067a1a3eea24eb4832393151b7a4

  • SSDEEP

    768:YooHRJXPXgfSFfSypjNdUoM224xWKr/OWtMiK7eE1nUVBqSYgK00LPfVaaIz:hG9hRcBSQq/OWG7R1+XKXfVJg

Score
10/10

Malware Config

Extracted

Family

xworm

C2

loss-winners.gl.at.ply.gg:61007

Attributes
  • Install_directory

    %AppData%

  • install_file

    Expensive 3.1.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Rogalik.rar
    .rar

    Password: 123

  • RogalikClient.exe
    .exe windows:4 windows x86 arch:x86

    Password: 123

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections