General
-
Target
tweek-rocket-setup.exe
-
Size
32KB
-
Sample
241103-nzvt6stbkc
-
MD5
09ebed41690f9af15ea1536d60a215d9
-
SHA1
861300733371c83836d8b4e651158fa87460454f
-
SHA256
56e5d98ce8739c72da2f4057886ffc345e9705bfaa15809ded992de2db4f86bd
-
SHA512
d3e3c969df9d5b24ec95e5b8d971d986950084d1b0dc69ac4aa0827f51daa77883b1390c6bbb8f3457bf83371fc7e820cac578776b65a589120eb450c1c1fd1e
-
SSDEEP
768:DDZXbbMjFrGk/VHPa7NQZFY9yvFgOjhs/p/:DDZXbqFak/VHyuFY9yvWOjCB/
Behavioral task
behavioral1
Sample
tweek-rocket-setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
tweek-rocket-setup.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
3.0
23.ip.gl.ply.gg:2222
6lVEdvwqk1qWGO8d
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
tweek-rocket-setup.exe
-
Size
32KB
-
MD5
09ebed41690f9af15ea1536d60a215d9
-
SHA1
861300733371c83836d8b4e651158fa87460454f
-
SHA256
56e5d98ce8739c72da2f4057886ffc345e9705bfaa15809ded992de2db4f86bd
-
SHA512
d3e3c969df9d5b24ec95e5b8d971d986950084d1b0dc69ac4aa0827f51daa77883b1390c6bbb8f3457bf83371fc7e820cac578776b65a589120eb450c1c1fd1e
-
SSDEEP
768:DDZXbbMjFrGk/VHPa7NQZFY9yvFgOjhs/p/:DDZXbqFak/VHyuFY9yvWOjCB/
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Adds Run key to start application
-