General
-
Target
RustAnticheat.exe
-
Size
1.1MB
-
Sample
240925-hncass1dnj
-
MD5
51d835de66bac2f502ae697a35baec90
-
SHA1
46ed68b3af1160c892090db77dbfd8916128afee
-
SHA256
544a9c11e53d104ee4987900bebeb849490735d2d3a076dd468bcdedd83b6fde
-
SHA512
1be17435d526b464aee3e453295feb831030a4ec9d87c1a4d47eee9b32a3728675fc29ff35143991209e75c5804d02612da31c51dbbad8a6054f03ad01660746
-
SSDEEP
24576:kEKrzjpnzLOtAi9SrsvNOOZT8XYYLvqKaZ2IJhaOtlj:dKr3hL4+yRT3KaIIj
Static task
static1
Behavioral task
behavioral1
Sample
RustAnticheat.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
RustAnticheat.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
RustAnticheat.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
RustAnticheat.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1286696205040226395/PlyXt42kMHxkNNkTVcuKXMSs07VdzNAX4G3WkobLmgEeCwny8D96kvYTWDW1AjLuLxBu
Extracted
xworm
web-amend.gl.at.ply.gg:59501
-
Install_directory
%AppData%
-
install_file
RuntimeBroker.exe
Targets
-
-
Target
RustAnticheat.exe
-
Size
1.1MB
-
MD5
51d835de66bac2f502ae697a35baec90
-
SHA1
46ed68b3af1160c892090db77dbfd8916128afee
-
SHA256
544a9c11e53d104ee4987900bebeb849490735d2d3a076dd468bcdedd83b6fde
-
SHA512
1be17435d526b464aee3e453295feb831030a4ec9d87c1a4d47eee9b32a3728675fc29ff35143991209e75c5804d02612da31c51dbbad8a6054f03ad01660746
-
SSDEEP
24576:kEKrzjpnzLOtAi9SrsvNOOZT8XYYLvqKaZ2IJhaOtlj:dKr3hL4+yRT3KaIIj
-
Detect Umbral payload
-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-