General
-
Target
1ca1a71f457d22db79dd70bc2e89042480791cc90e944f12c6c909b11d0c47d3
-
Size
357KB
-
Sample
240904-2vgnmsxhqq
-
MD5
a710588ee1e23934331a582c95feb624
-
SHA1
2201b586e9f124680b0aac1d36e25f55d4ddc9e2
-
SHA256
1ca1a71f457d22db79dd70bc2e89042480791cc90e944f12c6c909b11d0c47d3
-
SHA512
48afa80587490b70b1c744e76a0513700f5fa5adc70368be3bd0f3deb519087c961fadcf75dbbdb85c3d423bdadc4dd4807fdc5cf7a582828be5041529f0d3b0
-
SSDEEP
6144:e+BI+HMbm5wk3F2jac8/3rzFW6QWP1zJG1S6+hnvgstJo:eAI8MboQaJ/bzFpGQ6+
Static task
static1
Behavioral task
behavioral1
Sample
1ca1a71f457d22db79dd70bc2e89042480791cc90e944f12c6c909b11d0c47d3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1ca1a71f457d22db79dd70bc2e89042480791cc90e944f12c6c909b11d0c47d3.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
times-cingular.gl.at.ply.gg:34763
-
Install_directory
%AppData%
-
install_file
cvchost.exe
Extracted
umbral
https://ptb.discord.com/api/webhooks/1280534631719899197/_7_ESHHAWN6Qwt0AhmjGDQjpogj1YTyUsp04Llns_zEZS2n4Urjnv2EJPdmMICGTMI2B
Targets
-
-
Target
1ca1a71f457d22db79dd70bc2e89042480791cc90e944f12c6c909b11d0c47d3
-
Size
357KB
-
MD5
a710588ee1e23934331a582c95feb624
-
SHA1
2201b586e9f124680b0aac1d36e25f55d4ddc9e2
-
SHA256
1ca1a71f457d22db79dd70bc2e89042480791cc90e944f12c6c909b11d0c47d3
-
SHA512
48afa80587490b70b1c744e76a0513700f5fa5adc70368be3bd0f3deb519087c961fadcf75dbbdb85c3d423bdadc4dd4807fdc5cf7a582828be5041529f0d3b0
-
SSDEEP
6144:e+BI+HMbm5wk3F2jac8/3rzFW6QWP1zJG1S6+hnvgstJo:eAI8MboQaJ/bzFpGQ6+
-
Detect Umbral payload
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-