General

  • Target

    Everything Beta-1.4.1.5-Setup.exe

  • Size

    20.3MB

  • Sample

    240508-j3db3sdd62

  • MD5

    248c11af3c1baf0ac48b54db361071b9

  • SHA1

    1953ab650559b713e80e4b23b45591c5fbd4e2ba

  • SHA256

    a056ea99baf847f83f7f44ffa67f1e4c11106278906b0adf2c2b06676460ab25

  • SHA512

    6189ef68ed05fcb2a05c4bc4f42ad3b71ad0f2eda195b508448a0882590b9c5b61d7f6a59272e98716d43d78fa3730246e9f5027f79d797a5cb077bdc1ee90a2

  • SSDEEP

    393216:sWkOtjUaBTIi1KPkv2/kFyXKP1f2aUUP+oSfXBr3fmXn:s6tAadIPmtFJ2FoSfXB6Xn

Malware Config

Extracted

Family

xworm

C2

our-sole.gl.at.ply.gg:46097

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Targets

    • Target

      Everything Beta-1.4.1.5-Setup.exe

    • Size

      20.3MB

    • MD5

      248c11af3c1baf0ac48b54db361071b9

    • SHA1

      1953ab650559b713e80e4b23b45591c5fbd4e2ba

    • SHA256

      a056ea99baf847f83f7f44ffa67f1e4c11106278906b0adf2c2b06676460ab25

    • SHA512

      6189ef68ed05fcb2a05c4bc4f42ad3b71ad0f2eda195b508448a0882590b9c5b61d7f6a59272e98716d43d78fa3730246e9f5027f79d797a5cb077bdc1ee90a2

    • SSDEEP

      393216:sWkOtjUaBTIi1KPkv2/kFyXKP1f2aUUP+oSfXBr3fmXn:s6tAadIPmtFJ2FoSfXB6Xn

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks