General
-
Target
Obey_Omnis_e-GT.ini
-
Size
1KB
-
Sample
240802-2d82kaxgma
-
MD5
349f67039b55a7fac3a9a4a7c0dc6e4a
-
SHA1
24f305aa729c4f64fedf020a839b615e98e66d4b
-
SHA256
8ac9770ac25122bada4cabfd6d6e816202f971fbea251a30c58685ef90eb6b14
-
SHA512
9cb510b81969e5f51d9722465121078f1c3439de81e18cdc6261d08d5f3b516b081c893d1f1a6e374797a24f6cab9358675004ae3ae9ac51f20e061dc31bf33c
Static task
static1
Behavioral task
behavioral1
Sample
Obey_Omnis_e-GT.ini
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Obey_Omnis_e-GT.ini
Resource
win10v2004-20240802-en
Malware Config
Extracted
growtopia
https://discord.com/api/webhooks/1199763266872803338/8vedcXoMcyExhe1xhBm5f8ncmafWmOB3pkulE0l8g9Pel0t3ziyr2V51cLTVEjYsE4Rj
Extracted
xenorat
jctestwindows.airdns.org
Xeno_rat_nd8913d
-
delay
5000
-
install_path
temp
-
port
45010
-
startup_name
WindowsErrorHandler
Extracted
lumma
https://tenntysjuxmz.shop/api
Targets
-
-
Target
Obey_Omnis_e-GT.ini
-
Size
1KB
-
MD5
349f67039b55a7fac3a9a4a7c0dc6e4a
-
SHA1
24f305aa729c4f64fedf020a839b615e98e66d4b
-
SHA256
8ac9770ac25122bada4cabfd6d6e816202f971fbea251a30c58685ef90eb6b14
-
SHA512
9cb510b81969e5f51d9722465121078f1c3439de81e18cdc6261d08d5f3b516b081c893d1f1a6e374797a24f6cab9358675004ae3ae9ac51f20e061dc31bf33c
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1