General

  • Target

    UnblоckYT .exe

  • Size

    2.0MB

  • Sample

    240805-k2y3tswbqc

  • MD5

    9507d39a1268cc9bc49a89a5b6b1efde

  • SHA1

    62919a92df361ec9f797066b8fd025d7e07c2795

  • SHA256

    d815fcc722bee4f1025644dce314ce8c0b41d05491fd1e3c382a3b403564075f

  • SHA512

    ffd75d68a7e8025c11922681b3214a8c96d70f7fd30f6eb7f6429e3865113f5406cc33ac76cd1580c03b64a52ff846c2c6e8d75968876ab7ac0625dd4873bbc0

  • SSDEEP

    49152:jDjlabwz9heWYJm2SnlA3tc4F7VP0q8bJQ555Yw6hzAdxopxRL:PqwuWYKeTv0q8bG55v3q5

Malware Config

Extracted

Family

xworm

C2

connection-arizona.gl.at.ply.gg:65211

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1269943614985863178/Snv_QcCVwSIoYNJg4xeEatpV3Q1YTnWJobZDi7PbgCWJqJTv3OWTmQttxL-3iAWsDAxu

Targets

    • Target

      UnblоckYT .exe

    • Size

      2.0MB

    • MD5

      9507d39a1268cc9bc49a89a5b6b1efde

    • SHA1

      62919a92df361ec9f797066b8fd025d7e07c2795

    • SHA256

      d815fcc722bee4f1025644dce314ce8c0b41d05491fd1e3c382a3b403564075f

    • SHA512

      ffd75d68a7e8025c11922681b3214a8c96d70f7fd30f6eb7f6429e3865113f5406cc33ac76cd1580c03b64a52ff846c2c6e8d75968876ab7ac0625dd4873bbc0

    • SSDEEP

      49152:jDjlabwz9heWYJm2SnlA3tc4F7VP0q8bJQ555Yw6hzAdxopxRL:PqwuWYKeTv0q8bG55v3q5

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks