General
-
Target
Output.exe
-
Size
318KB
-
Sample
250212-tgmczayma1
-
MD5
76250a84f46395d5e50ba0178b714099
-
SHA1
fde7f65d449d42bd59d38ad99430663f7c4ece51
-
SHA256
f6cf0bc000965baa8fd8c103be34aa1ca9514c3e97f0a48b4558d2ab8b346e9c
-
SHA512
6bfb0eb5482e7635e25b65ac3e45e6eaf80e051cf742c7523ee4ff7b2de283e80d4294981747ad740a79f2ed0b54e068a75c3df69c85a9da423d5d3932ec0705
-
SSDEEP
6144:o2EX/IoKtm284A7aWAAAs1JuNAbq1QQYNbmkWA:3EXQDtN84YaWAA3IAuJO
Static task
static1
Behavioral task
behavioral1
Sample
Output.exe
Resource
win10ltsc2021-20250211-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1338955298215432203/bKCNv20MfC-uRLQ9U8b8R2MvcekWeTVte6JKtVnAGQhc4l2UJ1KxbIFnU9Q5hZfnLYXh
Extracted
xworm
147.185.221.25:64820
-
Install_directory
%Temp%
-
install_file
SecurityHost.exe
-
telegram
https://api.telegram.org/bot7873282441:AAFVeYQ8VZCC3gF8qlaTYIz4N-gMEL21mHI/sendMessage?chat_id=7952080340
Targets
-
-
Target
Output.exe
-
Size
318KB
-
MD5
76250a84f46395d5e50ba0178b714099
-
SHA1
fde7f65d449d42bd59d38ad99430663f7c4ece51
-
SHA256
f6cf0bc000965baa8fd8c103be34aa1ca9514c3e97f0a48b4558d2ab8b346e9c
-
SHA512
6bfb0eb5482e7635e25b65ac3e45e6eaf80e051cf742c7523ee4ff7b2de283e80d4294981747ad740a79f2ed0b54e068a75c3df69c85a9da423d5d3932ec0705
-
SSDEEP
6144:o2EX/IoKtm284A7aWAAAs1JuNAbq1QQYNbmkWA:3EXQDtN84YaWAA3IAuJO
-
Detect Umbral payload
-
Detect Xworm Payload
-
Umbral family
-
Xworm family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-