General

  • Target

    XenoFixer#V2.exe

  • Size

    229KB

  • Sample

    250222-gy2srszjcs

  • MD5

    9c90d0907aeacf4cd01f17181174c00a

  • SHA1

    1a6b0899f7b045de415e171c01ee4f4a4d2ca0d6

  • SHA256

    37a693ea922c569717f22f475238acb47b1d519b46644e0ed68a449bccc65e1a

  • SHA512

    88553e52a8d0e4aad59e7996a90ec18d82e127926c296c0200569c1f0c96ae2a144438dd30d7b375abb1bb353c50956301953f81bdbd7330dd1150bd522425c0

  • SSDEEP

    6144:tloZM+rIkd8g+EtXHkv/iD43kz6w2xpaJPyAxVkawb8e1mFi:voZtL+EP83kz6w2xpaJPyAxVkzv

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1342678709198389392/fiFPIcV3lEkwydSxD-VTPgd362xGJauyVpWxdetmVKW7kOS07-Nv6uYpkxRukNS7zVmr

Targets

    • Target

      XenoFixer#V2.exe

    • Size

      229KB

    • MD5

      9c90d0907aeacf4cd01f17181174c00a

    • SHA1

      1a6b0899f7b045de415e171c01ee4f4a4d2ca0d6

    • SHA256

      37a693ea922c569717f22f475238acb47b1d519b46644e0ed68a449bccc65e1a

    • SHA512

      88553e52a8d0e4aad59e7996a90ec18d82e127926c296c0200569c1f0c96ae2a144438dd30d7b375abb1bb353c50956301953f81bdbd7330dd1150bd522425c0

    • SSDEEP

      6144:tloZM+rIkd8g+EtXHkv/iD43kz6w2xpaJPyAxVkawb8e1mFi:voZtL+EP83kz6w2xpaJPyAxVkzv

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks