General
-
Target
VMXModMenu.exe
-
Size
101KB
-
Sample
250307-cq3ymsstdt
-
MD5
b2ed14da26475b542695dfeb44683e6b
-
SHA1
36fdcf814f1ab5ce4b563c9de97fe16c0c015dfc
-
SHA256
b9533e27109f91d578d381dc1997cc9301f5f8e5625c83b6430182a61e38ece1
-
SHA512
e7a5892ab83a8c9540073575f39d7f968996d7c5e93b7ae2421a9be7ea10a40ca719fabc4532b8bc065c71b9fb890b3965f8b2ef5b0528ae53f607e6d0379737
-
SSDEEP
768:R+SEjnwCkJjukg+4s/hrwWFyz9FE6OjhDQMQJGQAsGkK23u:RSja6u40J/FC9FE6Oj3fQAsGkK23u
Behavioral task
behavioral1
Sample
VMXModMenu.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
cGDrirmzU5eLYUoi
-
Install_directory
%AppData%
-
install_file
RobloxGraphics.exe
-
pastebin_url
https://pastebin.com/raw/ZdGpTLd0
Targets
-
-
Target
VMXModMenu.exe
-
Size
101KB
-
MD5
b2ed14da26475b542695dfeb44683e6b
-
SHA1
36fdcf814f1ab5ce4b563c9de97fe16c0c015dfc
-
SHA256
b9533e27109f91d578d381dc1997cc9301f5f8e5625c83b6430182a61e38ece1
-
SHA512
e7a5892ab83a8c9540073575f39d7f968996d7c5e93b7ae2421a9be7ea10a40ca719fabc4532b8bc065c71b9fb890b3965f8b2ef5b0528ae53f607e6d0379737
-
SSDEEP
768:R+SEjnwCkJjukg+4s/hrwWFyz9FE6OjhDQMQJGQAsGkK23u:RSja6u40J/FC9FE6Oj3fQAsGkK23u
-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-