General
-
Target
UnblоckYT.exe
-
Size
2.3MB
-
Sample
240805-labc5asbpm
-
MD5
d8d657ce3a75933e2857e47536fd6825
-
SHA1
704108cc72bf51fe837cf7ddfeb518a6a8d12d0a
-
SHA256
d0a6731abd7e60950d399983b0b1cf54a535be1c2f846b6b0836881db96a9c3e
-
SHA512
af1f2e8b9e5958b1d9d21e31311e15deeda23daa56c41adc85b671f14aee76daeca55211242096e826c70f6662c28cb5ef89fbe90eaf42f11aa4f23fa721ed33
-
SSDEEP
49152:7Djlabwz9heWF38XpWxKyNCNWakvy/+adWUKNwljT+Pb3Qz:3qwuWxOWxK6WWakvy35KEoi
Static task
static1
Behavioral task
behavioral1
Sample
UnblоckYT.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
UnblоckYT.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
connection-arizona.gl.at.ply.gg:65211
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
UnblоckYT.exe
-
Size
2.3MB
-
MD5
d8d657ce3a75933e2857e47536fd6825
-
SHA1
704108cc72bf51fe837cf7ddfeb518a6a8d12d0a
-
SHA256
d0a6731abd7e60950d399983b0b1cf54a535be1c2f846b6b0836881db96a9c3e
-
SHA512
af1f2e8b9e5958b1d9d21e31311e15deeda23daa56c41adc85b671f14aee76daeca55211242096e826c70f6662c28cb5ef89fbe90eaf42f11aa4f23fa721ed33
-
SSDEEP
49152:7Djlabwz9heWF38XpWxKyNCNWakvy/+adWUKNwljT+Pb3Qz:3qwuWxOWxK6WWakvy35KEoi
-
Detect Umbral payload
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1