General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Family
xworm
Version
3.0
C2
spain-trail.gl.at.ply.gg:51770
Mutex
q2KqNRza4QGi0rMH
Attributes
-
Install_directory
%AppData%
-
install_file
USB.exe
aes.plain
Extracted
Family
umbral
C2
https://discord.com/api/webhooks/1290029641578578002/m1fVsUigNqnmg9qL11KB2Dp0cwdGriuTSOUVDC73kL7e21WxRUV92BT2hxAtiAnCrbXG
Targets
-
-
Target
https://mega.nz/file/XcNlTJhQ#5hCN5dICum9c9ceFosZbHXB5dYP6HZKn6TsiTu6dfGw
-
Detect Umbral payload
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-