General

  • Target

    fixxxx.exe

  • Size

    1.1MB

  • Sample

    240702-shfq5sxhmh

  • MD5

    656c98a712018e49c94e823f1f30d038

  • SHA1

    f7400c9f13174b924c822871053fb1efa97a43b6

  • SHA256

    136cec1df46a4a97e2358e7b1ddcca2ec2853ecad6e004cbd959844d1e96d0e0

  • SHA512

    300b82e08c08391a369706a77907471527a6325909f64ed9c6e316b89f3e0659ddc0619bba1ee857f2b2a14865b3248161079e066ea6f3d6d340617f56a6a068

  • SSDEEP

    24576:Ut9UwrSmTCEu3LIy+PtTFngKrh67y8pWaUTNTfkROL6bE:C9PWDIB5Fnfrx8W1hn/

Malware Config

Extracted

Family

xworm

C2

20.ip.gl.ply.gg:53765

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1257705373842931812/tC0mK-jq5cX6npMOy_YAUDvD9Mp63k-HX1Zs0JwsyvoUpCeh4vfi_Qv8ttDXKYlNJiJD

Targets

    • Target

      fixxxx.exe

    • Size

      1.1MB

    • MD5

      656c98a712018e49c94e823f1f30d038

    • SHA1

      f7400c9f13174b924c822871053fb1efa97a43b6

    • SHA256

      136cec1df46a4a97e2358e7b1ddcca2ec2853ecad6e004cbd959844d1e96d0e0

    • SHA512

      300b82e08c08391a369706a77907471527a6325909f64ed9c6e316b89f3e0659ddc0619bba1ee857f2b2a14865b3248161079e066ea6f3d6d340617f56a6a068

    • SSDEEP

      24576:Ut9UwrSmTCEu3LIy+PtTFngKrh67y8pWaUTNTfkROL6bE:C9PWDIB5Fnfrx8W1hn/

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks