General
-
Target
NeuraX-SpooferTEMP.exe
-
Size
368KB
-
Sample
250220-h9vdhazjcz
-
MD5
35c6f16313a956763c7402b49499b1f9
-
SHA1
8f12a11413044b39cdd626be408aaae50254e4a5
-
SHA256
d76a5a1ae2f2537b56c7e0499ab5f0c8ea28d7efbbc9793a5174aabbedc74f4e
-
SHA512
fa16a5e069f5c0133674c5d3a515162a43c68cb619cf646b499fbd20b66dbc50a1dcd38003eeaa9335a95d432a8aa5bca1d0d6814011007d46b80e9556331cac
-
SSDEEP
6144:/3KWL1LMxGp99JRlnzN6gqoZ7zms0oXgd6TKU6EKKXclsBGlDstmvcHcI0us:/PLMxGpPJvzNZZ7iqgoTR2+ED0m0Hc6
Static task
static1
Behavioral task
behavioral1
Sample
NeuraX-SpooferTEMP.exe
Resource
win7-20240729-en
Malware Config
Extracted
xworm
127.0.0.1:3913
purpose-perth.gl.at.ply.gg:3913
127.0.0.1:14182
figure-cement.gl.at.ply.gg:14182
-
Install_directory
%Userprofile%
-
install_file
USB.exe
Extracted
umbral
https://discord.com/api/webhooks/1339055156502986883/hV7TgqQ9AafNGFGpp7dC-W403JrFQJgWGzHFHp2kf7TXQCcWELY6esk8kBXS_EYrIukR
Targets
-
-
Target
NeuraX-SpooferTEMP.exe
-
Size
368KB
-
MD5
35c6f16313a956763c7402b49499b1f9
-
SHA1
8f12a11413044b39cdd626be408aaae50254e4a5
-
SHA256
d76a5a1ae2f2537b56c7e0499ab5f0c8ea28d7efbbc9793a5174aabbedc74f4e
-
SHA512
fa16a5e069f5c0133674c5d3a515162a43c68cb619cf646b499fbd20b66dbc50a1dcd38003eeaa9335a95d432a8aa5bca1d0d6814011007d46b80e9556331cac
-
SSDEEP
6144:/3KWL1LMxGp99JRlnzN6gqoZ7zms0oXgd6TKU6EKKXclsBGlDstmvcHcI0us:/PLMxGpPJvzNZZ7iqgoTR2+ED0m0Hc6
-
Detect Umbral payload
-
Detect Xworm Payload
-
Umbral family
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-