General

  • Target

    KIWIX V3.1.rar

  • Size

    8.7MB

  • Sample

    240310-nlal3sca4s

  • MD5

    9cf34f46b9afe38750ace93847f12983

  • SHA1

    63bc3b4a1ee041340215701de61e64cc80984412

  • SHA256

    9ef84ee6a8079e8f9c3011cb162a51804954c75e04a4810e24fa4393811372b7

  • SHA512

    28381a282d78131c927f162d32b522b264377ccc90166dfff5e0d905215a76830ef9d91179fce235b86a4ea90ecc2c5960115df6ecdeb638f1dc1f42fe959e2a

  • SSDEEP

    196608:EHA4GkQxgvXI6EdtmD5EYiQNwLbQtNkJdycAg0vlfSS/Al43/fK:EHAvYXQdoD28IsIzycAHsf

Malware Config

Targets

    • Target

      KIWIX V3.1.rar

    • Size

      8.7MB

    • MD5

      9cf34f46b9afe38750ace93847f12983

    • SHA1

      63bc3b4a1ee041340215701de61e64cc80984412

    • SHA256

      9ef84ee6a8079e8f9c3011cb162a51804954c75e04a4810e24fa4393811372b7

    • SHA512

      28381a282d78131c927f162d32b522b264377ccc90166dfff5e0d905215a76830ef9d91179fce235b86a4ea90ecc2c5960115df6ecdeb638f1dc1f42fe959e2a

    • SSDEEP

      196608:EHA4GkQxgvXI6EdtmD5EYiQNwLbQtNkJdycAg0vlfSS/Al43/fK:EHAvYXQdoD28IsIzycAHsf

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks