General

  • Target

    XwormRAT-6ffec2e3e08096b1a19ed5cbb931590c3b0c2c5fef87c2f221bdf00099736fe1.exe

  • Size

    325KB

  • Sample

    250212-t7eqtazme1

  • MD5

    7a52c4004cff0607cfb41514a8012304

  • SHA1

    c2efe4e8378102db567520c9e6b8f8732ce078b7

  • SHA256

    6ffec2e3e08096b1a19ed5cbb931590c3b0c2c5fef87c2f221bdf00099736fe1

  • SHA512

    d61e7a2272a9898b19b53bc5f94f72a8bcaf079d974eadc92d1b14d7ff00323245c7db33274e630ef9d8441be4ae18f378de5ddfe0bf0d9486eaf4d19c78feef

  • SSDEEP

    6144:y9Nue9jnROyTeAlUueYEL7AK52Z5+GaavsQXrJw8oB2XiOG:yfOyTeEUuLEL7D52ZQGB0QXrdA2X

Malware Config

Extracted

Family

xworm

C2

flash-affordable.gl.at.ply.gg:64820

Attributes
  • Install_directory

    %Temp%

  • install_file

    SecurityHost.exe

  • telegram

    https://api.telegram.org/bot7873282441:AAFVeYQ8VZCC3gF8qlaTYIz4N-gMEL21mHI/sendMessage?chat_id=7952080340

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1338955298215432203/bKCNv20MfC-uRLQ9U8b8R2MvcekWeTVte6JKtVnAGQhc4l2UJ1KxbIFnU9Q5hZfnLYXh

Targets

    • Target

      XwormRAT-6ffec2e3e08096b1a19ed5cbb931590c3b0c2c5fef87c2f221bdf00099736fe1.exe

    • Size

      325KB

    • MD5

      7a52c4004cff0607cfb41514a8012304

    • SHA1

      c2efe4e8378102db567520c9e6b8f8732ce078b7

    • SHA256

      6ffec2e3e08096b1a19ed5cbb931590c3b0c2c5fef87c2f221bdf00099736fe1

    • SHA512

      d61e7a2272a9898b19b53bc5f94f72a8bcaf079d974eadc92d1b14d7ff00323245c7db33274e630ef9d8441be4ae18f378de5ddfe0bf0d9486eaf4d19c78feef

    • SSDEEP

      6144:y9Nue9jnROyTeAlUueYEL7AK52Z5+GaavsQXrJw8oB2XiOG:yfOyTeEUuLEL7D52ZQGB0QXrdA2X

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks