General
-
Target
GhostBinder-FUD.exe
-
Size
11.7MB
-
Sample
240803-vbza1stfkc
-
MD5
c26e5cbca0f6cc30fc2af85f95942a82
-
SHA1
13c9a25bb4a57a119d6a10b7a940fc3a23906065
-
SHA256
8d6eda15b51552fce75401a9cd2f5c57a4af4fbc5f7a7262385f0d2652024bcb
-
SHA512
a54bd316887f4ebdbf51a614437733a3cbd0f9810e86ad3684b2c00db353f122cd349e0366c9c733b0d08282ba1f748155dcc01a6055465e5710e10b5a45507e
-
SSDEEP
196608:q9qMTFBJ82JYp3n780E998EFcCsqeaLJaAjEi71IUfvd3QzUy5kB2UQn2x/XZ3RT:q95lup3nI5vRTeeh71IUfvd35HLQni/3
Static task
static1
Behavioral task
behavioral1
Sample
GhostBinder-FUD.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
GhostBinder-FUD.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
5.0
EEarXqazEvX73BCq
-
Install_directory
%AppData%
-
install_file
Chrome Update.exe
-
pastebin_url
https://pastebin.com/raw/RPPi3ByL
Extracted
gurcu
https://api.telegram.org/bot7483240807:AAEYFrBoMgquxWoikOe9bVlqmoMC2b2AOO4/sendMessage?chat_id=5279018187
Targets
-
-
Target
GhostBinder-FUD.exe
-
Size
11.7MB
-
MD5
c26e5cbca0f6cc30fc2af85f95942a82
-
SHA1
13c9a25bb4a57a119d6a10b7a940fc3a23906065
-
SHA256
8d6eda15b51552fce75401a9cd2f5c57a4af4fbc5f7a7262385f0d2652024bcb
-
SHA512
a54bd316887f4ebdbf51a614437733a3cbd0f9810e86ad3684b2c00db353f122cd349e0366c9c733b0d08282ba1f748155dcc01a6055465e5710e10b5a45507e
-
SSDEEP
196608:q9qMTFBJ82JYp3n780E998EFcCsqeaLJaAjEi71IUfvd3QzUy5kB2UQn2x/XZ3RT:q95lup3nI5vRTeeh71IUfvd35HLQni/3
-
Detect Xworm Payload
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1