General

  • Target

    SSPInstallerV2.exe

  • Size

    634KB

  • Sample

    240803-sf3g5axaqq

  • MD5

    8f27d14a78615dc0c6d100ca3f96a86a

  • SHA1

    3d267acd9ae52e0585e091826a57af1a53450ae6

  • SHA256

    2f724138cbe4102823295fb51e7edb615b95a0eeae09434596e70f28bc0e64a9

  • SHA512

    0af71aed92eda0f10cd435a542d3b6fbada85be89e4d94f5c029ee81b0c0167140cf801bfdaa816d479aa435741a337f827be61683ffd32367d1b1c2d276c7d7

  • SSDEEP

    6144:3kuuqTIKE3cPTWyG08SLGf5FKlunGth1mQVSomL3To7ovjqjvrKi5z5XThDLGfwk:3DuqhE3cPqy9uuunGtNSnP/OzHST

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1269302041445142548/7kHNPJkzcEXhevOi0GE-ta2E1mwfJ5-sBn7_at06BC13YjVrSo2F-y7QrDWzHj8zAjbY

Extracted

Family

xworm

C2

by-thus.gl.at.ply.gg:35938

Attributes
  • Install_directory

    %Temp%

  • install_file

    SSPinstaller.exe

Targets

    • Target

      SSPInstallerV2.exe

    • Size

      634KB

    • MD5

      8f27d14a78615dc0c6d100ca3f96a86a

    • SHA1

      3d267acd9ae52e0585e091826a57af1a53450ae6

    • SHA256

      2f724138cbe4102823295fb51e7edb615b95a0eeae09434596e70f28bc0e64a9

    • SHA512

      0af71aed92eda0f10cd435a542d3b6fbada85be89e4d94f5c029ee81b0c0167140cf801bfdaa816d479aa435741a337f827be61683ffd32367d1b1c2d276c7d7

    • SSDEEP

      6144:3kuuqTIKE3cPTWyG08SLGf5FKlunGth1mQVSomL3To7ovjqjvrKi5z5XThDLGfwk:3DuqhE3cPqy9uuunGtNSnP/OzHST

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks