General

  • Target

    Output.exe

  • Size

    318KB

  • Sample

    250212-tgmczayma1

  • MD5

    76250a84f46395d5e50ba0178b714099

  • SHA1

    fde7f65d449d42bd59d38ad99430663f7c4ece51

  • SHA256

    f6cf0bc000965baa8fd8c103be34aa1ca9514c3e97f0a48b4558d2ab8b346e9c

  • SHA512

    6bfb0eb5482e7635e25b65ac3e45e6eaf80e051cf742c7523ee4ff7b2de283e80d4294981747ad740a79f2ed0b54e068a75c3df69c85a9da423d5d3932ec0705

  • SSDEEP

    6144:o2EX/IoKtm284A7aWAAAs1JuNAbq1QQYNbmkWA:3EXQDtN84YaWAA3IAuJO

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1338955298215432203/bKCNv20MfC-uRLQ9U8b8R2MvcekWeTVte6JKtVnAGQhc4l2UJ1KxbIFnU9Q5hZfnLYXh

Extracted

Family

xworm

C2

147.185.221.25:64820

Attributes
  • Install_directory

    %Temp%

  • install_file

    SecurityHost.exe

  • telegram

    https://api.telegram.org/bot7873282441:AAFVeYQ8VZCC3gF8qlaTYIz4N-gMEL21mHI/sendMessage?chat_id=7952080340

Targets

    • Target

      Output.exe

    • Size

      318KB

    • MD5

      76250a84f46395d5e50ba0178b714099

    • SHA1

      fde7f65d449d42bd59d38ad99430663f7c4ece51

    • SHA256

      f6cf0bc000965baa8fd8c103be34aa1ca9514c3e97f0a48b4558d2ab8b346e9c

    • SHA512

      6bfb0eb5482e7635e25b65ac3e45e6eaf80e051cf742c7523ee4ff7b2de283e80d4294981747ad740a79f2ed0b54e068a75c3df69c85a9da423d5d3932ec0705

    • SSDEEP

      6144:o2EX/IoKtm284A7aWAAAs1JuNAbq1QQYNbmkWA:3EXQDtN84YaWAA3IAuJO

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks