General
-
Target
VM1.-.x64.exe
-
Size
837KB
-
Sample
231208-aferyshe9t
-
MD5
6b7fe527dd88ea7c4fc10e3aa4bebd71
-
SHA1
5272f90277e0b3dfae74322ec109d45e7daf6ccd
-
SHA256
8b69239c6c167f4d06abefc55e7e554a2c3d3d31de0b64cb9500ec45f1c24fef
-
SHA512
ac3c0d38bd6cd2a3c1355fbb3750d255d3552300950a8811caef7b4b211e8fbae5cfd69b522a71eaae6b3a20c1be0895400d68147ae768b00ffb1c42e7ae6f19
-
SSDEEP
24576:xm2D/+vZGgMPTDshxquGKFzFTSpkPInW:xDD/+hXMPM9FTFInW
Static task
static1
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1179573880306806895/9PPafRuKqunRXMBgRp7lwh-lO7PV6gpu6bih39np__mk8ZAghkJ95dBDKUvofe3l-iRe
https://discord.com/api/webhooks/1182449804958248970/DRF0ya2e3evg84K0Bvj6KDwl3i7xtSWZ3g0gIs0o-TUVRK-JP1st19-yHi5V8uo23sfe
Extracted
xworm
owner-cc.gl.at.ply.gg:32281
-
install_file
USB.exe
Targets
-
-
Target
VM1.-.x64.exe
-
Size
837KB
-
MD5
6b7fe527dd88ea7c4fc10e3aa4bebd71
-
SHA1
5272f90277e0b3dfae74322ec109d45e7daf6ccd
-
SHA256
8b69239c6c167f4d06abefc55e7e554a2c3d3d31de0b64cb9500ec45f1c24fef
-
SHA512
ac3c0d38bd6cd2a3c1355fbb3750d255d3552300950a8811caef7b4b211e8fbae5cfd69b522a71eaae6b3a20c1be0895400d68147ae768b00ffb1c42e7ae6f19
-
SSDEEP
24576:xm2D/+vZGgMPTDshxquGKFzFTSpkPInW:xDD/+hXMPM9FTFInW
-
Detect Umbral payload
-
Detect Xworm Payload
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-