General

  • Target

    9ed8d863b2e97e161cb9bf8d55a6de344e937abc7ee4f9b389d4b68856958166

  • Size

    2.0MB

  • Sample

    240902-ljxygsxcln

  • MD5

    109f33fa15241c81efaac87a8980af95

  • SHA1

    e09534ee32e4c61d679e4af575594585de1fe573

  • SHA256

    9ed8d863b2e97e161cb9bf8d55a6de344e937abc7ee4f9b389d4b68856958166

  • SHA512

    9626580a3250405b7ab0071d25bbe7b43c495d0c85fa78321cdd397d89da1434429821e3985cb657ac9abd1673797c496974bf5e44ca86d9ce2ea67235c2842b

  • SSDEEP

    49152:0Wb0Efe1/152k9tiF0YUpqFUM1ZbSr2g/1eU6yL/b0Xw+Nv:0WIEeQk94qn8Kewt1eU6i/b+w+F

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1276901959336595519/rnT2bUPlA6cH1e0gUJyRqEX6pBDNwefr13SwZvDBO14mTuQ8UwQDE9Xp0Hqk7Lk4A6UI

Extracted

Family

xworm

C2

21.ip.gl.ply.gg:29567

Attributes
  • Install_directory

    %Temp%

  • install_file

    runtimebroken.exe

Targets

    • Target

      9e90c1219aac375230e375f3d641f6b1edb2968acb41d542528ad744714c9b35.exe

    • Size

      2.0MB

    • MD5

      b5de23814a83134fca7ce2dbc450af36

    • SHA1

      b5592ad63cbc1706a66dbf7d4c9d833572ab1ecc

    • SHA256

      9e90c1219aac375230e375f3d641f6b1edb2968acb41d542528ad744714c9b35

    • SHA512

      775b910fa2918ff3a49d75beb93b51a2f09ab7cf679dab6b1046b261962b2e35d0b326bea528d195fde52259ff1692b46659b9a64cc930e5f097d4abe5752c87

    • SSDEEP

      49152:MnOpOCv0Z29PyAey5pV/ohTXY2H2mS5auQi0dGf1ecKxClrpHZ:tON+v5p2TXvWfUeEIR

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detect Umbral payload

    • Detect Xworm Payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks