General

  • Target

    freerobuxkid.zip

  • Size

    273KB

  • Sample

    240715-mtpwassekp

  • MD5

    4f92b49a95512369456cb2402f0bc88e

  • SHA1

    955092b26264cc0034b05411df573c76799e97e6

  • SHA256

    78a1a3bab4ca5d2a45b46903f4682209e19a43683a46c8b90aab769972791f42

  • SHA512

    dd4052c7573896764f0de673bdf6ee1f0b38281c14f03f4dbf7407af6d10ff4ed377e262b07b5c195f30495fd6f04fff1cd6f81b4bc75ed83fc94e536e5daa51

  • SSDEEP

    6144:7zVhUxmlK9K6hyxvsTBTTTjdzn+0NiaVs3XPe/nYCC:3VhZlqN+vs5TvR+bRPeYCC

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/ME817Qqj

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1244505203496194133/h3wJ8jEzsCkiD_oJMOEgKD6W-dcdUxngCdZj3Rs3uHGbU8AbvcL1w442PjqCArkBwS10

Targets

    • Target

      freerobuxkid.exe

    • Size

      603KB

    • MD5

      110661737f95174fa0134da2375920f4

    • SHA1

      3cfb6c3f2ffbd469fdee32b085c33a62ff7e768b

    • SHA256

      7162d3e3ae071703320d478702541eccb82636200dc0e29aa880b93b2766440c

    • SHA512

      342ca30c288cc9eab1f567ab03cf75b1ac10547b046a9e86a21048499af0bfd830d8e82ce93d953d97267c7630202774b4fb1a1ddad038e512a916ad8789f4dd

    • SSDEEP

      6144:SoFNIF/iYvOFUV1aH4P9wOLae6VlWT8b94FfclKwCE8TtrXHiPOib36hlbT00cHu:jsF/LRVMW9wOaPVle8ufyVCfTJw

    • Detect Umbral payload

    • Detect Xworm Payload

    • Modifies WinLogon for persistence

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks