General
-
Target
IO tootls.exe
-
Size
209KB
-
Sample
240225-gvj4jseb6t
-
MD5
841d1c344cc00671b25a80e6db3b1e06
-
SHA1
1952391bfc777b4cd2acc403d895dd7e198aa013
-
SHA256
932efb570cd8045499675443a910394b5c6bec45511aa2c517a636bd3e385766
-
SHA512
75af1637e76c307c6241a4ac26859a9260c2198d2aa83e5a6c52e0ec6bb37fac4cecf4f002f05d861356f833fc306869682e3195c0e6ba603e8ebf4b9a98f96e
-
SSDEEP
6144:v5DmisKDLvohc1Y3o40bbwhpn8+jPmqSQj33zO9Y:xXLDor440y8oPmZW
Static task
static1
Behavioral task
behavioral1
Sample
IO tootls.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral2
Sample
IO tootls.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
IO tootls.exe
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
IO tootls.exe
Resource
win10v2004-20240221-en
Malware Config
Extracted
xworm
hai1723rat-60039.portmap.io:60039
Extracted
umbral
https://discord.com/api/webhooks/1211176678466916392/99VOwP9dc7iQz2Is-QlZ872KZaiUa4r3sEvXqZ6NmS-fFuTojiUjOg2SjIUWBCIoPNFA
Targets
-
-
Target
IO tootls.exe
-
Size
209KB
-
MD5
841d1c344cc00671b25a80e6db3b1e06
-
SHA1
1952391bfc777b4cd2acc403d895dd7e198aa013
-
SHA256
932efb570cd8045499675443a910394b5c6bec45511aa2c517a636bd3e385766
-
SHA512
75af1637e76c307c6241a4ac26859a9260c2198d2aa83e5a6c52e0ec6bb37fac4cecf4f002f05d861356f833fc306869682e3195c0e6ba603e8ebf4b9a98f96e
-
SSDEEP
6144:v5DmisKDLvohc1Y3o40bbwhpn8+jPmqSQj33zO9Y:xXLDor440y8oPmZW
-
Detect Umbral payload
-
Detect Xworm Payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-