General

  • Target

    Setup.exe

  • Size

    993KB

  • Sample

    240423-s97zpshf4v

  • MD5

    dde34dd7a89277b7b02fc45ff4062924

  • SHA1

    04124d2f2e336c2f2cad93864bd5f94d1ac50a16

  • SHA256

    4e5336a604b94c01e5a20601fdf4b18c627431c78b0609d57eec3ced40c2eed7

  • SHA512

    339db41c8d6a72bd4092b197efbb32f53284904406d0b6ee2929915398edb3ca3db31cb02f9c5cf9b16bf347c2caa1524123667dc8607263b2038e1f6ea78c71

  • SSDEEP

    24576:jkfrJg6/TDTYgGnFRqcV/+JCt9Fx0P9sqgLjuJW:K/7Yg6Q9LJW

Malware Config

Extracted

Family

eternity

C2

http://izrukvro5khcol3z7cvvdq3akeunlod2gshgn7ppo3a4jvse3z5hpiyd.onion

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    PictureManager.exe

  • pastebin_url

    https://pastebin.com/raw/Jqa9Y1S2

Targets

    • Target

      Setup.exe

    • Size

      993KB

    • MD5

      dde34dd7a89277b7b02fc45ff4062924

    • SHA1

      04124d2f2e336c2f2cad93864bd5f94d1ac50a16

    • SHA256

      4e5336a604b94c01e5a20601fdf4b18c627431c78b0609d57eec3ced40c2eed7

    • SHA512

      339db41c8d6a72bd4092b197efbb32f53284904406d0b6ee2929915398edb3ca3db31cb02f9c5cf9b16bf347c2caa1524123667dc8607263b2038e1f6ea78c71

    • SSDEEP

      24576:jkfrJg6/TDTYgGnFRqcV/+JCt9Fx0P9sqgLjuJW:K/7Yg6Q9LJW

    • Detect Umbral payload

    • Detect Xworm Payload

    • Eternity

      Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks