General
-
Target
Nursultan Leake1d.exe
-
Size
423KB
-
Sample
240224-vacevsgg56
-
MD5
56b7bf9fd3324fcad106b4951fdb51da
-
SHA1
f15da91511d34268fc24d86184d56b73e9d22f0a
-
SHA256
be29b8bd644e04309f5becd26ee65e3138b50f44090767003b16fd02f428d451
-
SHA512
7a29b4493f7736b1b001cc540568c7bae9a5b604e0ecfa185ffd675053d39014797f37fb74815e10e7891a006a65f076c1a871a2ed715c182c3250d465222092
-
SSDEEP
6144:QzUbeFpDxUC6eVy9QetdHZwJvJMxhnel93mdQoCX:Q5/yIVjAFZwJxEh
Malware Config
Extracted
xworm
content-royal.gl.at.ply.gg:35017
-
Install_directory
%AppData%
-
install_file
conhost.exe
Targets
-
-
Target
Nursultan Leake1d.exe
-
Size
423KB
-
MD5
56b7bf9fd3324fcad106b4951fdb51da
-
SHA1
f15da91511d34268fc24d86184d56b73e9d22f0a
-
SHA256
be29b8bd644e04309f5becd26ee65e3138b50f44090767003b16fd02f428d451
-
SHA512
7a29b4493f7736b1b001cc540568c7bae9a5b604e0ecfa185ffd675053d39014797f37fb74815e10e7891a006a65f076c1a871a2ed715c182c3250d465222092
-
SSDEEP
6144:QzUbeFpDxUC6eVy9QetdHZwJvJMxhnel93mdQoCX:Q5/yIVjAFZwJxEh
-
Detect Umbral payload
-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1