General

  • Target

    https://mega.nz/file/XcNlTJhQ#5hCN5dICum9c9ceFosZbHXB5dYP6HZKn6TsiTu6dfGw

  • Sample

    240929-yfsktaxelk

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1290029641578578002/m1fVsUigNqnmg9qL11KB2Dp0cwdGriuTSOUVDC73kL7e21WxRUV92BT2hxAtiAnCrbXG

Extracted

Family

xworm

Version

3.0

C2

spain-trail.gl.at.ply.gg:51770

Mutex

q2KqNRza4QGi0rMH

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      https://mega.nz/file/XcNlTJhQ#5hCN5dICum9c9ceFosZbHXB5dYP6HZKn6TsiTu6dfGw

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks