General
-
Target
5a513e62b9e97d52553248d22e37f25f
-
Size
215KB
-
Sample
240301-n7kzyafh7t
-
MD5
022cd619c82b6c15b502afbfeec6debf
-
SHA1
cbb40b18c6ee74346efab7ac2a1e69100b6c3e00
-
SHA256
f13ef71b6d5e9a6872adb20673aa42a6d7cc6ab305bd20bc8fed059a6597f29f
-
SHA512
01f997451d33002d8502209afd816b7b6e5a3bc964230da351d70c11e0f144390cdf276b850f13815f414f92370bf6cfd89231eb4b9b1a75b4a8b8bb7f307758
-
SSDEEP
6144:oDAi86jCtMC5q+gXctZ8eGJ8rhNb8Imc:o0T6DCPxeJMx8+
Static task
static1
Behavioral task
behavioral1
Sample
5a513e62b9e97d52553248d22e37f25f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5a513e62b9e97d52553248d22e37f25f.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
5a513e62b9e97d52553248d22e37f25f.exe
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
5a513e62b9e97d52553248d22e37f25f.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1211176678466916392/99VOwP9dc7iQz2Is-QlZ872KZaiUa4r3sEvXqZ6NmS-fFuTojiUjOg2SjIUWBCIoPNFA
Extracted
xworm
hai1723rat-60039.portmap.io:60039
Targets
-
-
Target
5a513e62b9e97d52553248d22e37f25f
-
Size
215KB
-
MD5
022cd619c82b6c15b502afbfeec6debf
-
SHA1
cbb40b18c6ee74346efab7ac2a1e69100b6c3e00
-
SHA256
f13ef71b6d5e9a6872adb20673aa42a6d7cc6ab305bd20bc8fed059a6597f29f
-
SHA512
01f997451d33002d8502209afd816b7b6e5a3bc964230da351d70c11e0f144390cdf276b850f13815f414f92370bf6cfd89231eb4b9b1a75b4a8b8bb7f307758
-
SSDEEP
6144:oDAi86jCtMC5q+gXctZ8eGJ8rhNb8Imc:o0T6DCPxeJMx8+
-
Detect Umbral payload
-
Detect Xworm Payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-