General
-
Target
JJSploit.exe
-
Size
6.6MB
-
Sample
250223-cs71datrfy
-
MD5
f29fd0bb7218e3cf63ab6040be0a1698
-
SHA1
c078e4888d6e1cf6c75a4141d51a1d375c2f71c8
-
SHA256
ccbcc6269218d292a06db3d9896dc621598a76794881ffbeb6f093d8b54e1c43
-
SHA512
b68185e83baca3f8779e085fed57a0324fee7528139c4afa245900f206707b645f631cb08d8a2cc3ea6b75a65d0e5ac76c250897e28df2c6e7c4724f7790f40d
-
SSDEEP
196608:1dNnRdvjsTOvHK19gO8xbecifaCI1L5N1JTLX46:z1RSavI9sbf8vKf5
Malware Config
Extracted
xworm
study-conclusions.gl.at.ply.gg:20142
-
Install_directory
%Temp%
-
install_file
System32.exe
Targets
-
-
Target
JJSploit.exe
-
Size
6.6MB
-
MD5
f29fd0bb7218e3cf63ab6040be0a1698
-
SHA1
c078e4888d6e1cf6c75a4141d51a1d375c2f71c8
-
SHA256
ccbcc6269218d292a06db3d9896dc621598a76794881ffbeb6f093d8b54e1c43
-
SHA512
b68185e83baca3f8779e085fed57a0324fee7528139c4afa245900f206707b645f631cb08d8a2cc3ea6b75a65d0e5ac76c250897e28df2c6e7c4724f7790f40d
-
SSDEEP
196608:1dNnRdvjsTOvHK19gO8xbecifaCI1L5N1JTLX46:z1RSavI9sbf8vKf5
-
Detect Umbral payload
-
Detect Xworm Payload
-
Umbral family
-
Xworm family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-