Resubmissions
13-07-2024 23:41
240713-3pr3vstcrb 10General
-
Target
Discord Tool v.7.7.exe
-
Size
65KB
-
Sample
240713-3pr3vstcrb
-
MD5
5ff4a7e0fefe94b3bbf86f2137577ff2
-
SHA1
67d9e82ef85881813228e902fd7880e0ceba20b9
-
SHA256
a562d44e4bf6ec4f8a15c420bc3343f56011b2b454862869e01471075cba1a7e
-
SHA512
05edf0d3bc2da186f6a159ef6e5c6f0456fc0979e188c8e8cb62799e0c663515dd9d4aaf631ac8f7830934a618e6eca5fd94e0e1d39d14ee9fbf68e97e8319a4
-
SSDEEP
768:kRwwGkRrFpObTMFIiVZTKb9hFrTbpkLZ9WBf6Owg5+OWhXBZ5/HA:kRxGW5kbTqgTbpm9g6jk+OWRxHA
Behavioral task
behavioral1
Sample
Discord Tool v.7.7.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
xworm
original-preston.gl.at.ply.gg:51307
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
Discord Tool v.7.7.exe
-
Size
65KB
-
MD5
5ff4a7e0fefe94b3bbf86f2137577ff2
-
SHA1
67d9e82ef85881813228e902fd7880e0ceba20b9
-
SHA256
a562d44e4bf6ec4f8a15c420bc3343f56011b2b454862869e01471075cba1a7e
-
SHA512
05edf0d3bc2da186f6a159ef6e5c6f0456fc0979e188c8e8cb62799e0c663515dd9d4aaf631ac8f7830934a618e6eca5fd94e0e1d39d14ee9fbf68e97e8319a4
-
SSDEEP
768:kRwwGkRrFpObTMFIiVZTKb9hFrTbpkLZ9WBf6Owg5+OWhXBZ5/HA:kRxGW5kbTqgTbpm9g6jk+OWRxHA
-
Detect Umbral payload
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1