General

  • Target

    FunChecker.zip

  • Size

    13.6MB

  • Sample

    240720-sng66a1hjm

  • MD5

    669dea55a11d260b90159e727d0fb6e2

  • SHA1

    632d22f8eaacfbe16c12001e8df11c724d75d335

  • SHA256

    35a2a6f94f05c505f822208734c2d31fb69aede9f963103855b4721585290605

  • SHA512

    766d43c423df779cf9abc6819dd00342f2c8dfca054fbda466b256b5ff495cf58665d95dfe7e51af21f45c96b48ab94e155ef787feb072c3714df9c46e377b76

  • SSDEEP

    393216:8+/9XsBVCRuMjbDgzBufO1GjXo1kUyVl/+Y:b94ongz2XekfVll

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1263969302936031242/olHrwbuoNh8UxVs0Eh00oYjpj3hs8m4JFfGFTZq-qdru9A_R06a4zPTH8NVHDmX7Crj_

Extracted

Family

xworm

Version

3.0

C2

plus-loves.gl.at.ply.gg:59327

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      FunChecker.zip

    • Size

      13.6MB

    • MD5

      669dea55a11d260b90159e727d0fb6e2

    • SHA1

      632d22f8eaacfbe16c12001e8df11c724d75d335

    • SHA256

      35a2a6f94f05c505f822208734c2d31fb69aede9f963103855b4721585290605

    • SHA512

      766d43c423df779cf9abc6819dd00342f2c8dfca054fbda466b256b5ff495cf58665d95dfe7e51af21f45c96b48ab94e155ef787feb072c3714df9c46e377b76

    • SSDEEP

      393216:8+/9XsBVCRuMjbDgzBufO1GjXo1kUyVl/+Y:b94ongz2XekfVll

    Score
    4/10
    • Target

      FunChecker.exe

    • Size

      13.6MB

    • MD5

      8b2fa6497ba4fc285a5545bda2e8cde6

    • SHA1

      31cec6fb97888c34c80af8ca73aa67456f68e4e3

    • SHA256

      5197fcb7b98a65eabf8151d847bb394eccd65a184f06a82f674a9b95e62e701c

    • SHA512

      fbf93ca3aecabdbb4a8c978037ca15f14b990fdd32c892e0fdd8bbb491bde8005fbf8326dbd89adf71e9c7cca7f1592dc7ef5694cc45181a50332ed6a594ee40

    • SSDEEP

      393216:jrmibLqxo6IKWmKF8tmZ4O/Qtu1dmoz2jqK8VPYAjV2:jr7b+xHI76tmZ4O4E1d99QAjQ

    • Detect Umbral payload

    • Detect Xworm Payload

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks