General
-
Target
freerobuxkid.zip
-
Size
273KB
-
Sample
240715-mtpwassekp
-
MD5
4f92b49a95512369456cb2402f0bc88e
-
SHA1
955092b26264cc0034b05411df573c76799e97e6
-
SHA256
78a1a3bab4ca5d2a45b46903f4682209e19a43683a46c8b90aab769972791f42
-
SHA512
dd4052c7573896764f0de673bdf6ee1f0b38281c14f03f4dbf7407af6d10ff4ed377e262b07b5c195f30495fd6f04fff1cd6f81b4bc75ed83fc94e536e5daa51
-
SSDEEP
6144:7zVhUxmlK9K6hyxvsTBTTTjdzn+0NiaVs3XPe/nYCC:3VhZlqN+vs5TvR+bRPeYCC
Static task
static1
Behavioral task
behavioral1
Sample
freerobuxkid.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/ME817Qqj
Extracted
umbral
https://discord.com/api/webhooks/1244505203496194133/h3wJ8jEzsCkiD_oJMOEgKD6W-dcdUxngCdZj3Rs3uHGbU8AbvcL1w442PjqCArkBwS10
Targets
-
-
Target
freerobuxkid.exe
-
Size
603KB
-
MD5
110661737f95174fa0134da2375920f4
-
SHA1
3cfb6c3f2ffbd469fdee32b085c33a62ff7e768b
-
SHA256
7162d3e3ae071703320d478702541eccb82636200dc0e29aa880b93b2766440c
-
SHA512
342ca30c288cc9eab1f567ab03cf75b1ac10547b046a9e86a21048499af0bfd830d8e82ce93d953d97267c7630202774b4fb1a1ddad038e512a916ad8789f4dd
-
SSDEEP
6144:SoFNIF/iYvOFUV1aH4P9wOLae6VlWT8b94FfclKwCE8TtrXHiPOib36hlbT00cHu:jsF/LRVMW9wOaPVle8ufyVCfTJw
-
Detect Umbral payload
-
Detect Xworm Payload
-
Modifies WinLogon for persistence
-
Drops file in Drivers directory
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1