General
-
Target
XBinderOutput2.exe
-
Size
17.8MB
-
Sample
240509-hm713seh9v
-
MD5
a8cda1e3a11a63a5100710ebae243fc3
-
SHA1
576b05edb98b7a876d718cf68431829cb3fa9de6
-
SHA256
821af9552ad85d2d62532f2d93e8c16f7630aeddbbdc9cbe0c567ea7dbf784fa
-
SHA512
63c3f941a1ee1d6394c2ec47c6a4c9965e6c52432a2139e26a330b249dec2edc18818f37c758e52b6b18f1b836aa31e87eccaa93af72ee91fcbc03a0dd15f3e0
-
SSDEEP
393216:SQafHC7YYWipbNd1u1xMe7nW3xKHJ0Z+HkkmyRG4:NafC7Y4BNd1u1xZ7W3x80AA1
Static task
static1
Behavioral task
behavioral1
Sample
XBinderOutput2.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
XBinderOutput2.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
xworm
our-sole.gl.at.ply.gg:46907
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
umbral
https://discord.com/api/webhooks/1236611629903380501/oT2tsAnrV_nKS_jRzm9Dp__bJxe9t_Ww5HM_1B2JjBrixMsDcr3JT5wfaEqHWCedkawt
Targets
-
-
Target
XBinderOutput2.exe
-
Size
17.8MB
-
MD5
a8cda1e3a11a63a5100710ebae243fc3
-
SHA1
576b05edb98b7a876d718cf68431829cb3fa9de6
-
SHA256
821af9552ad85d2d62532f2d93e8c16f7630aeddbbdc9cbe0c567ea7dbf784fa
-
SHA512
63c3f941a1ee1d6394c2ec47c6a4c9965e6c52432a2139e26a330b249dec2edc18818f37c758e52b6b18f1b836aa31e87eccaa93af72ee91fcbc03a0dd15f3e0
-
SSDEEP
393216:SQafHC7YYWipbNd1u1xMe7nW3xKHJ0Z+HkkmyRG4:NafC7Y4BNd1u1xZ7W3x80AA1
-
Detect Umbral payload
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1