General

  • Target

    RustAnticheat.rar

  • Size

    1.1MB

  • Sample

    240922-n1w4mayanj

  • MD5

    7e36d1084ee467853375a328cfa5296b

  • SHA1

    580a6cb8042a5e29d0754e06a10ba568b1807eed

  • SHA256

    cb3cbf908ddcfff886bf0a0f9e9b159a5aae7e8cb5acb3d52e7a672728c0f25d

  • SHA512

    c95e4e7d9188f60fcf0755eeb551f1effa416085ffd2450eb0fdd7886ded0cfddba6b750a89acea711cdbf0aa208908775afd4f93f880f17af8e457d30ce032b

  • SSDEEP

    24576:WG4Ed/C+D6btqC6XZb4oW9CGHdgEqMFe+UIEu0Za+gKQ5LLhPW2mhrp0q:ska+DYtUXlRITLxquSZQxLhPQ0q

Malware Config

Extracted

Family

xworm

C2

expected-schema.gl.at.ply.gg:2980

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    USB.exe

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1286299751637192826/RNAV05TJwC7uQTEETo8ZiWSJKOrj5gYY87jlWomaK7jJ1jmuh7qm4pMjcc2ZUhDh6jxd

Targets

    • Target

      RustAnticheat.exe

    • Size

      1.1MB

    • MD5

      6d63fe8c87e642d9e380a13803aa6858

    • SHA1

      5652877b527da6cec16dfa7e9653d3657fedea8b

    • SHA256

      066692a03f240a40c237f5ec3270d27cac1fda40630dd29f40db006b79a542a8

    • SHA512

      32ad077db3f44cd184f60a715464a0540615fee76cbb4de20c6a2703b1ef2a74391adfad0e77a4c3b2340f9bafbc18238445f19e7fcebf2c11e76e66376d000d

    • SSDEEP

      24576:Ucvup1OydVxYPtGU8ynaQpLUcgs5JTqzCZxGcQVyULZ6U6/:U/1OydfMrgsfX04KZ69/

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks