General

  • Target

    archive_63.zip

  • Size

    16.6MB

  • MD5

    da56157918045aef5a930af0d866cba2

  • SHA1

    ea37d14d38da6c3ee30ad7ec3f9625e83d49ee2a

  • SHA256

    ec9fa98b9c0a55ad5d3b51bf6148b6e2041d1a14c36b4ad98caa9438bc3854e9

  • SHA512

    018823503967b49b6021a737a5671045aef62fb89b35c33c412e57d19689c8196ec2bed8a380f9fa26bb44364d9ac9dced1cfd025de672b464c6f02f35e3ae68

  • SSDEEP

    393216:H77W5szE6LLPsj7cbOZm3cKU54N6RsBq2xgWNfsNpnqkSC:H7aslsjaOAU54N6uwcPaf

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1351005466335121518/twCTnfzoSiI-aCcNO4qPr6FH-T4gOkPWQV2wxS9C01GGw7XemgcLtgFXaMAxuEVtAD2v

Extracted

Family

xworm

C2

xkpog9yml.localto.net:5392

:5392

Attributes
  • Install_directory

    %Temp%

  • install_file

    windowsservice.exe

Extracted

Family

xworm

Version

5.0

C2

192.168.31.83:7000

Mutex

YenTYj55WBldZrhk

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Signatures

  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Detect Umbral payload 1 IoCs
  • Detect Xworm Payload 2 IoCs
  • Umbral family
  • Xworm family
  • Unsigned PE 16 IoCs

    Checks for missing Authenticode signature.

Files

  • archive_63.zip
    .zip
  • fe25de503f5fa57842d11d2180a935855b8f89b23fd6fa95ff10272cee5f305a.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • fe282eaa9036b889aafc6db602127b45.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • fe402f76d319a9f80cd522e793223efbc3f914bfe149da1801c999b8539c964d.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • fe55574c53882722b864ad5f07d521c0.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • fe8a65a43dcdd12c0341ab7e5cc56c3f.exe
    .exe windows:4 windows x64 arch:x64


    Headers

    Sections

  • fe99ddfdfc78f8223ddd4511fafbccd50e22d089c428f9c6cea01d89b2142c6c.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • feb2c82a6695709d9304734b55a6a350.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
    .exe windows:4 windows x64 arch:x64


    Headers

    Sections

  • ff03c0c01a5acef84aa5acdf32b445cd.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • ff1699c2d9f4f22e51e270417a93a15a.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • ff573ccb268f734e737c764bc60f0ddd.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • ff5eef1816b5037715c6da38464a8a3f.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • ff9b69031d761a8641f29c72ab6db843864620d9db1b867995e370840a891cc2.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • ffc0421deeff7949183a7fbc2e55850b.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • ffc45f2c5865480a76df2d8f64009673.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • fffa7ee6ec076412930605bd55bbc491.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections