General

  • Target

    Nursultan.exe

  • Size

    462KB

  • Sample

    250223-g6f62ayjgv

  • MD5

    5e87192e88d28da6e48574dba90b159f

  • SHA1

    ab209d00616ba41d1ee823d1d24fb8869dd77ad9

  • SHA256

    85e840236b64e2e801a97b5ebaae10358d642bb832e93f7f7dca7ed791ab6bd4

  • SHA512

    2442167a5a33d8f9a5fd896061007d67689478c8b009776b8d647832a740d85e716935b313eefdcaec635851237e52ee566341c3547bfde66acb7cd9b5c2af34

  • SSDEEP

    12288:dhoZtL+EP8HUwLYe5xysXKYZd8JV2x2gFM+bAWoHUQZEuM:dfI80wLYe5xysXKYZd8JV4JMYolM

Malware Config

Targets

    • Target

      Nursultan.exe

    • Size

      462KB

    • MD5

      5e87192e88d28da6e48574dba90b159f

    • SHA1

      ab209d00616ba41d1ee823d1d24fb8869dd77ad9

    • SHA256

      85e840236b64e2e801a97b5ebaae10358d642bb832e93f7f7dca7ed791ab6bd4

    • SHA512

      2442167a5a33d8f9a5fd896061007d67689478c8b009776b8d647832a740d85e716935b313eefdcaec635851237e52ee566341c3547bfde66acb7cd9b5c2af34

    • SSDEEP

      12288:dhoZtL+EP8HUwLYe5xysXKYZd8JV2x2gFM+bAWoHUQZEuM:dfI80wLYe5xysXKYZd8JV4JMYolM

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks