General
-
Target
я хз.exe
-
Size
60.0MB
-
Sample
240316-y8akpsbe2v
-
MD5
5d6cfc446688ff35118f60f1c0c6d9ec
-
SHA1
c38cc9315d6212dbf9a2b0121bedf8e19e4489c9
-
SHA256
ffe78ab905d69421ab325f5f6fa0e1448a01245538d1f275abaa645e44fb0cb5
-
SHA512
2d48eb58d9d145171efe3e98782bf1a8fbd28b2b7fb3b038172a8b36016bf318a9fb0f8e2729f3023a99ad2e3a05225030e18614792818046705531dcbcad199
-
SSDEEP
49152:qn5mOaNuKQGr02wVAFJApbVY6e7D5jD9KVSxU03l8U+cweXeFrA1n:q5mlkK1Dqne7D5jD9KVSxU8g9A
Static task
static1
Behavioral task
behavioral1
Sample
я хз.exe
Resource
win7-20240221-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1218609538920353852/S1ojkdaVMzB73hU0FP8eYpB-410O6wodDINDM_pIeYL7IbxP-7KaqYh-SCI37JJ02Eb_
https://discord.com/api/webhooks/1218255752314097764/pf1l_fyX4Y944q-tMNsmbSq2cfDBpqCBXuTvF0vyF76tkTcn3FOYasjrq_iM6NffJOYF
Extracted
xworm
approved-supports.gl.at.ply.gg:45098
-
Install_directory
%AppData%
-
install_file
rat.exe
Extracted
njrat
im523
HacKed
6.tcp.eu.ngrok.io:11599
56b4ba924dd7632c1dcce848fbc8f14a
-
reg_key
56b4ba924dd7632c1dcce848fbc8f14a
-
splitter
|'|'|
Targets
-
-
Target
я хз.exe
-
Size
60.0MB
-
MD5
5d6cfc446688ff35118f60f1c0c6d9ec
-
SHA1
c38cc9315d6212dbf9a2b0121bedf8e19e4489c9
-
SHA256
ffe78ab905d69421ab325f5f6fa0e1448a01245538d1f275abaa645e44fb0cb5
-
SHA512
2d48eb58d9d145171efe3e98782bf1a8fbd28b2b7fb3b038172a8b36016bf318a9fb0f8e2729f3023a99ad2e3a05225030e18614792818046705531dcbcad199
-
SSDEEP
49152:qn5mOaNuKQGr02wVAFJApbVY6e7D5jD9KVSxU03l8U+cweXeFrA1n:q5mlkK1Dqne7D5jD9KVSxU8g9A
-
Detect Umbral payload
-
Detect Xworm Payload
-
Detect ZGRat V1
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
2