General

  • Target

    1ca1a71f457d22db79dd70bc2e89042480791cc90e944f12c6c909b11d0c47d3

  • Size

    357KB

  • Sample

    240904-2vgnmsxhqq

  • MD5

    a710588ee1e23934331a582c95feb624

  • SHA1

    2201b586e9f124680b0aac1d36e25f55d4ddc9e2

  • SHA256

    1ca1a71f457d22db79dd70bc2e89042480791cc90e944f12c6c909b11d0c47d3

  • SHA512

    48afa80587490b70b1c744e76a0513700f5fa5adc70368be3bd0f3deb519087c961fadcf75dbbdb85c3d423bdadc4dd4807fdc5cf7a582828be5041529f0d3b0

  • SSDEEP

    6144:e+BI+HMbm5wk3F2jac8/3rzFW6QWP1zJG1S6+hnvgstJo:eAI8MboQaJ/bzFpGQ6+

Malware Config

Extracted

Family

xworm

C2

times-cingular.gl.at.ply.gg:34763

Attributes
  • Install_directory

    %AppData%

  • install_file

    cvchost.exe

Extracted

Family

umbral

C2

https://ptb.discord.com/api/webhooks/1280534631719899197/_7_ESHHAWN6Qwt0AhmjGDQjpogj1YTyUsp04Llns_zEZS2n4Urjnv2EJPdmMICGTMI2B

Targets

    • Target

      1ca1a71f457d22db79dd70bc2e89042480791cc90e944f12c6c909b11d0c47d3

    • Size

      357KB

    • MD5

      a710588ee1e23934331a582c95feb624

    • SHA1

      2201b586e9f124680b0aac1d36e25f55d4ddc9e2

    • SHA256

      1ca1a71f457d22db79dd70bc2e89042480791cc90e944f12c6c909b11d0c47d3

    • SHA512

      48afa80587490b70b1c744e76a0513700f5fa5adc70368be3bd0f3deb519087c961fadcf75dbbdb85c3d423bdadc4dd4807fdc5cf7a582828be5041529f0d3b0

    • SSDEEP

      6144:e+BI+HMbm5wk3F2jac8/3rzFW6QWP1zJG1S6+hnvgstJo:eAI8MboQaJ/bzFpGQ6+

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks