General
-
Target
Nursultan.exe
-
Size
462KB
-
Sample
250223-g6f62ayjgv
-
MD5
5e87192e88d28da6e48574dba90b159f
-
SHA1
ab209d00616ba41d1ee823d1d24fb8869dd77ad9
-
SHA256
85e840236b64e2e801a97b5ebaae10358d642bb832e93f7f7dca7ed791ab6bd4
-
SHA512
2442167a5a33d8f9a5fd896061007d67689478c8b009776b8d647832a740d85e716935b313eefdcaec635851237e52ee566341c3547bfde66acb7cd9b5c2af34
-
SSDEEP
12288:dhoZtL+EP8HUwLYe5xysXKYZd8JV2x2gFM+bAWoHUQZEuM:dfI80wLYe5xysXKYZd8JV4JMYolM
Malware Config
Targets
-
-
Target
Nursultan.exe
-
Size
462KB
-
MD5
5e87192e88d28da6e48574dba90b159f
-
SHA1
ab209d00616ba41d1ee823d1d24fb8869dd77ad9
-
SHA256
85e840236b64e2e801a97b5ebaae10358d642bb832e93f7f7dca7ed791ab6bd4
-
SHA512
2442167a5a33d8f9a5fd896061007d67689478c8b009776b8d647832a740d85e716935b313eefdcaec635851237e52ee566341c3547bfde66acb7cd9b5c2af34
-
SSDEEP
12288:dhoZtL+EP8HUwLYe5xysXKYZd8JV2x2gFM+bAWoHUQZEuM:dfI80wLYe5xysXKYZd8JV4JMYolM
-
Detect Umbral payload
-
Detect Xworm Payload
-
Umbral family
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-