General
-
Target
fixxxx.exe
-
Size
1.1MB
-
Sample
240702-shfq5sxhmh
-
MD5
656c98a712018e49c94e823f1f30d038
-
SHA1
f7400c9f13174b924c822871053fb1efa97a43b6
-
SHA256
136cec1df46a4a97e2358e7b1ddcca2ec2853ecad6e004cbd959844d1e96d0e0
-
SHA512
300b82e08c08391a369706a77907471527a6325909f64ed9c6e316b89f3e0659ddc0619bba1ee857f2b2a14865b3248161079e066ea6f3d6d340617f56a6a068
-
SSDEEP
24576:Ut9UwrSmTCEu3LIy+PtTFngKrh67y8pWaUTNTfkROL6bE:C9PWDIB5Fnfrx8W1hn/
Static task
static1
Behavioral task
behavioral1
Sample
fixxxx.exe
Resource
win7-20240220-en
Malware Config
Extracted
xworm
20.ip.gl.ply.gg:53765
-
Install_directory
%AppData%
-
install_file
svchost.exe
Extracted
umbral
https://discord.com/api/webhooks/1257705373842931812/tC0mK-jq5cX6npMOy_YAUDvD9Mp63k-HX1Zs0JwsyvoUpCeh4vfi_Qv8ttDXKYlNJiJD
Targets
-
-
Target
fixxxx.exe
-
Size
1.1MB
-
MD5
656c98a712018e49c94e823f1f30d038
-
SHA1
f7400c9f13174b924c822871053fb1efa97a43b6
-
SHA256
136cec1df46a4a97e2358e7b1ddcca2ec2853ecad6e004cbd959844d1e96d0e0
-
SHA512
300b82e08c08391a369706a77907471527a6325909f64ed9c6e316b89f3e0659ddc0619bba1ee857f2b2a14865b3248161079e066ea6f3d6d340617f56a6a068
-
SSDEEP
24576:Ut9UwrSmTCEu3LIy+PtTFngKrh67y8pWaUTNTfkROL6bE:C9PWDIB5Fnfrx8W1hn/
-
Detect Umbral payload
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-