General

  • Target

    Astro-V15.3.rar

  • Size

    101.5MB

  • Sample

    240710-yz4geszgja

  • MD5

    e921978b06d27ed846b460f3d67938c9

  • SHA1

    beb04a5fde1a1d1c681e9e55a1bf35cc17ced8f4

  • SHA256

    9af8b897f56f1b73c8111b9c7a47038606dd385c03e452500b5b8e24bf115a83

  • SHA512

    bb63bbe47a34f3f174501f6ee7a299bcc62dd992f0c77101b0537f361f6bc829626234f3ce4416dde6da3d2fea71cf5f340c537655f8530f9be5a19101b0ca75

  • SSDEEP

    1572864:YSs7Ti62D4DpJ+zy935baYuCLLJMXzlCYdFfp+ydopJDIsgNBPheLDZjV:0Ti62kDpJ0C3QwwCGTo7ECLDZB

Malware Config

Extracted

Family

xworm

Version

3.0

C2

127.0.0.1:14289

Mutex

3fE1bhMQefjKxWsl

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    USB.exe

aes.plain

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1260204024884494396/XQNUro5TXjnsRYRYDN9BlltAdsJlmbEOCddhRxQnArV8Y5HIaQN634DB3DJUPNyTDMLd

Targets

    • Target

      Astro-V15.3.exe

    • Size

      102.0MB

    • MD5

      4febea6c84e05008393647554b5ba483

    • SHA1

      eb327e8b6e66c0ac91e52c5a773ccc6ef594cf1a

    • SHA256

      ad6e27a94edf7e7c54a78b009d944dbc0b7068cb6ef2804f6e038f3db5d76d01

    • SHA512

      b93db0dc591d156faa2f3a18a55e081473db8b04ae5477a1fc620708d66bfe405c62fb84e64b68bc988dad9239d4916ad83d2233933c8ec570fbb57f896d9d1d

    • SSDEEP

      3145728:qz//2lnX6Me2PxaqomQ/Od2eLIkEMCJkT5pv+:k3knqdOq+nUkLC2p

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks