General

  • Target

    Output.exe

  • Size

    322KB

  • Sample

    250211-x6qy8sylez

  • MD5

    710c071c63a8d8d1cd493c81d34834dc

  • SHA1

    050c535a206ac05550e3670ef465efe83585a76b

  • SHA256

    38944e7579d5fcd2263e7212954619c496d4ff087360b8db6e190e1bdf5358ce

  • SHA512

    af1753c06c22178d1362ab964e445dbe49c5cf3c83ebceabf21b9a7c4cc30efbc66b3a28c4d4f90efba081faba84047edb190d2f05abe416ebf1a1b6c36aad13

  • SSDEEP

    6144:PhPKqm0guLkkFZFjbnSrOsrfUVCmveA3E6Chow8rtryB8YROu+oSxOFDxXMR17:5NnnfZTSHfUV7/E6twurFG+oS4FDxXMP

Malware Config

Extracted

Family

xworm

C2

147.185.221.19:18254

Attributes
  • Install_directory

    %Temp%

  • install_file

    SecurityHost.exe

  • telegram

    https://api.telegram.org/bot7873282441:AAFVeYQ8VZCC3gF8qlaTYIz4N-gMEL21mHI/sendMessage?chat_id=7952080340

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1315319389234663454/VqoRw_khZ1Mydiisut3PyEHlF4iC_sCu736uMNVyatDDeHcTWNwsEKe2PRLuH4NrOZdd

Targets

    • Target

      Output.exe

    • Size

      322KB

    • MD5

      710c071c63a8d8d1cd493c81d34834dc

    • SHA1

      050c535a206ac05550e3670ef465efe83585a76b

    • SHA256

      38944e7579d5fcd2263e7212954619c496d4ff087360b8db6e190e1bdf5358ce

    • SHA512

      af1753c06c22178d1362ab964e445dbe49c5cf3c83ebceabf21b9a7c4cc30efbc66b3a28c4d4f90efba081faba84047edb190d2f05abe416ebf1a1b6c36aad13

    • SSDEEP

      6144:PhPKqm0guLkkFZFjbnSrOsrfUVCmveA3E6Chow8rtryB8YROu+oSxOFDxXMR17:5NnnfZTSHfUV7/E6twurFG+oS4FDxXMP

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks