General
-
Target
FATALITY crack.rar
-
Size
262KB
-
Sample
240723-v3t6da1dpr
-
MD5
6f83d45a76075e0d66894de6864c72ff
-
SHA1
b262629f4e7f66991cde84bf9eb3f09337f052c0
-
SHA256
47cf91642bc874355d72f1c4f696bff16a21f797298a0e4a45627b48f8312f47
-
SHA512
060c14339a57884f344e26dc41d7bf80d3d3568d74c34ad22b42d20435a78fe64782c62185751bdc53fe8cc4491ab846a91511bcc1d34b5d78e46500321275f5
-
SSDEEP
6144:Dj7tyysf04LVGdE6q+/QYzwaXIkQo2zHmuCPA3ALTCl9OR4:DXTs8EVGC63/QYzw8iGuF3AabOy
Static task
static1
Behavioral task
behavioral1
Sample
FATALITY crack.rar
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
FATALITY crack/FATALITY.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
FATALITY crack/injector.dll
Resource
win10-20240404-en
Malware Config
Extracted
xworm
technology-various.gl.at.ply.gg:29919
-
Install_directory
%AppData%
-
install_file
Windows Defender.exe
Extracted
umbral
https://discordapp.com/api/webhooks/1265055151446818938/8qlqTfX2kKSRcNCB_ui_biHNYYtoz-JAuCWgqM04dhYNoHnyDKjKpgi3chJusMHz6139
Targets
-
-
Target
FATALITY crack.rar
-
Size
262KB
-
MD5
6f83d45a76075e0d66894de6864c72ff
-
SHA1
b262629f4e7f66991cde84bf9eb3f09337f052c0
-
SHA256
47cf91642bc874355d72f1c4f696bff16a21f797298a0e4a45627b48f8312f47
-
SHA512
060c14339a57884f344e26dc41d7bf80d3d3568d74c34ad22b42d20435a78fe64782c62185751bdc53fe8cc4491ab846a91511bcc1d34b5d78e46500321275f5
-
SSDEEP
6144:Dj7tyysf04LVGdE6q+/QYzwaXIkQo2zHmuCPA3ALTCl9OR4:DXTs8EVGC63/QYzw8iGuF3AabOy
Score3/10 -
-
-
Target
FATALITY crack/FATALITY.exe
-
Size
528KB
-
MD5
bbf3615f2a8a9b9bcddcbed8da9db09f
-
SHA1
2d307ff6e7b8a94331f49c27605fe26de415c7d8
-
SHA256
1885e517df6e315357016b5b0f96dedc86b58f5d163a20fa688dae41d3a7fb51
-
SHA512
6f0b0c61a1b94c6725f925cdbb72baf834281100ae7f03892265cd584c29666a52aadadddbe3e5e4811c0151ce711f46fe16b1828a2a2ad2b56de4b3e3556acf
-
SSDEEP
6144:70mlZXPQf8X0Xhm4LzKx/T5yQc9TyPJ1RAyAwjXIRydhoVJmnJZgSCq15P7nMalY:B2nhOxg9eCwjWydhoVKgSX1x7nluEG
-
Detect Umbral payload
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
FATALITY crack/injector.dll
-
Size
170KB
-
MD5
2bdf6c2175922c0c7b8fc10b475171fe
-
SHA1
d965953a56f441578ecf809e750f9dae722eeb22
-
SHA256
3cf2bc9edea167b1d820352d6f98f1793a6f381a8de7e04f5ab1dc27811408f7
-
SHA512
17458f631850dfd3bfd0f243b072741e2020a2e9f80e86a2aeced40742d5eba99447f646050c2c95090622e78c75505cae8aa8d09dc261c832e5b5d2e34f9b1b
-
SSDEEP
768:Tdddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd/:P
Score1/10 -