General

  • Target

    c9503b2cd74d905b18d1b8b06a04541eceef2e766b94bd209caf54abc7ea68c8

  • Size

    355KB

  • Sample

    240805-e1vq5a1bke

  • MD5

    9d9707eebd3b914d6e5fb71c16ea6547

  • SHA1

    97907b4623d6f564b0e13b8f3442db718f0f3a97

  • SHA256

    c9503b2cd74d905b18d1b8b06a04541eceef2e766b94bd209caf54abc7ea68c8

  • SHA512

    9bf246a8a4b28099f59a767c6b458908e288c9d16b7aac6282247c0bb97984bb2f959a21b2c6ddca9597a725f3d40533fff19bec470b925e0f46846ed1d0353f

  • SSDEEP

    6144:SxgdTbIr+mXJGNlrhOTBE28f5WI6+CoLLfY4GO86LdFIGk4U2I:SxkANXgdOTBE28IIXLgfZ+WGk4Ul

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1269302041445142548/7kHNPJkzcEXhevOi0GE-ta2E1mwfJ5-sBn7_at06BC13YjVrSo2F-y7QrDWzHj8zAjbY

Extracted

Family

xworm

C2

by-thus.gl.at.ply.gg:35938

Attributes
  • Install_directory

    %Temp%

  • install_file

    SSPinstaller.exe

Targets

    • Target

      2f724138cbe4102823295fb51e7edb615b95a0eeae09434596e70f28bc0e64a9.exe

    • Size

      634KB

    • MD5

      8f27d14a78615dc0c6d100ca3f96a86a

    • SHA1

      3d267acd9ae52e0585e091826a57af1a53450ae6

    • SHA256

      2f724138cbe4102823295fb51e7edb615b95a0eeae09434596e70f28bc0e64a9

    • SHA512

      0af71aed92eda0f10cd435a542d3b6fbada85be89e4d94f5c029ee81b0c0167140cf801bfdaa816d479aa435741a337f827be61683ffd32367d1b1c2d276c7d7

    • SSDEEP

      6144:3kuuqTIKE3cPTWyG08SLGf5FKlunGth1mQVSomL3To7ovjqjvrKi5z5XThDLGfwk:3DuqhE3cPqy9uuunGtNSnP/OzHST

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks