General

  • Target

    obxod236dev.exe

  • Size

    324KB

  • Sample

    250223-mmzf6asnew

  • MD5

    d429f5d73a91de14778bae5fb0f79331

  • SHA1

    368a76ec5dcb300ab2b962ea3130839bb4a7cd8f

  • SHA256

    b371f2297254813a544d9ca193c79602c99e46e68816f87455594ca08dffc7bb

  • SHA512

    6f058a43df86a6f17595073e91b925d444a36e226d04fb51bda8e186835c964faa5c6f687bd2718e155a22e130dd30700e8fd752e490c0770f6d671ca78d3c08

  • SSDEEP

    6144:KHMf5ZdffTWP8nWCxW4z0xlLGIDAnOo0oStH+SN5H928xh9Ss2:1BZdf8sWCYpxQIjO2e6BH2

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1342862584386420817/8iDLBPWkMbkgW0Lx9Tlnezr6EGJYKsdRBZ8GJHI66h0NchvKorRU-U6oiQsKR-OZeqD9

Extracted

Family

xworm

C2

25.ip.gl.ply.gg:59054

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      obxod236dev.exe

    • Size

      324KB

    • MD5

      d429f5d73a91de14778bae5fb0f79331

    • SHA1

      368a76ec5dcb300ab2b962ea3130839bb4a7cd8f

    • SHA256

      b371f2297254813a544d9ca193c79602c99e46e68816f87455594ca08dffc7bb

    • SHA512

      6f058a43df86a6f17595073e91b925d444a36e226d04fb51bda8e186835c964faa5c6f687bd2718e155a22e130dd30700e8fd752e490c0770f6d671ca78d3c08

    • SSDEEP

      6144:KHMf5ZdffTWP8nWCxW4z0xlLGIDAnOo0oStH+SN5H928xh9Ss2:1BZdf8sWCYpxQIjO2e6BH2

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks