General
-
Target
Astro-V15.3.rar
-
Size
101.5MB
-
Sample
240710-yz4geszgja
-
MD5
e921978b06d27ed846b460f3d67938c9
-
SHA1
beb04a5fde1a1d1c681e9e55a1bf35cc17ced8f4
-
SHA256
9af8b897f56f1b73c8111b9c7a47038606dd385c03e452500b5b8e24bf115a83
-
SHA512
bb63bbe47a34f3f174501f6ee7a299bcc62dd992f0c77101b0537f361f6bc829626234f3ce4416dde6da3d2fea71cf5f340c537655f8530f9be5a19101b0ca75
-
SSDEEP
1572864:YSs7Ti62D4DpJ+zy935baYuCLLJMXzlCYdFfp+ydopJDIsgNBPheLDZjV:0Ti62kDpJ0C3QwwCGTo7ECLDZB
Static task
static1
Behavioral task
behavioral1
Sample
Astro-V15.3.exe
Resource
win7-20240705-en
Malware Config
Extracted
xworm
3.0
127.0.0.1:14289
3fE1bhMQefjKxWsl
-
Install_directory
%Userprofile%
-
install_file
USB.exe
Extracted
umbral
https://discord.com/api/webhooks/1260204024884494396/XQNUro5TXjnsRYRYDN9BlltAdsJlmbEOCddhRxQnArV8Y5HIaQN634DB3DJUPNyTDMLd
Targets
-
-
Target
Astro-V15.3.exe
-
Size
102.0MB
-
MD5
4febea6c84e05008393647554b5ba483
-
SHA1
eb327e8b6e66c0ac91e52c5a773ccc6ef594cf1a
-
SHA256
ad6e27a94edf7e7c54a78b009d944dbc0b7068cb6ef2804f6e038f3db5d76d01
-
SHA512
b93db0dc591d156faa2f3a18a55e081473db8b04ae5477a1fc620708d66bfe405c62fb84e64b68bc988dad9239d4916ad83d2233933c8ec570fbb57f896d9d1d
-
SSDEEP
3145728:qz//2lnX6Me2PxaqomQ/Od2eLIkEMCJkT5pv+:k3knqdOq+nUkLC2p
-
Detect Umbral payload
-
Detect Xworm Payload
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1