General
-
Target
RustAnticheat.exe
-
Size
1.1MB
-
Sample
241003-v64h8a1fka
-
MD5
84e9631aef9d0342cae8466ed841ca7f
-
SHA1
fed84e7f25bb9f337a99e820111e87be1de954aa
-
SHA256
b929ede4c76d1db2d2b1698d401d658fbce5e440fd54f4071701aae69ed791e9
-
SHA512
9fd3bf2966edb0ae54a9a46ded59fde75e6c7653078a5cac3563333a0f3ee1c197cfd622c2828855aacbc2023ff85f3d37a01dcb360a0b611aa1a43d59cdd36b
-
SSDEEP
24576:y1zV1C+mn91Bm1uyv43wswHTFZp/qg0GsO0iT7puGB:uh0I0yIYzFZ90Gstw
Static task
static1
Behavioral task
behavioral1
Sample
RustAnticheat.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
web-amend.gl.at.ply.gg:59501
-
Install_directory
%Userprofile%
-
install_file
USB.exe
Extracted
umbral
https://discord.com/api/webhooks/1291451585494515744/LKDGh0k0NWFEqtktblmpi9FMNE2PK1J-08hBfSDWZ6hts8lC3NILBGDzrEYeKRQMidcr
Targets
-
-
Target
RustAnticheat.exe
-
Size
1.1MB
-
MD5
84e9631aef9d0342cae8466ed841ca7f
-
SHA1
fed84e7f25bb9f337a99e820111e87be1de954aa
-
SHA256
b929ede4c76d1db2d2b1698d401d658fbce5e440fd54f4071701aae69ed791e9
-
SHA512
9fd3bf2966edb0ae54a9a46ded59fde75e6c7653078a5cac3563333a0f3ee1c197cfd622c2828855aacbc2023ff85f3d37a01dcb360a0b611aa1a43d59cdd36b
-
SSDEEP
24576:y1zV1C+mn91Bm1uyv43wswHTFZp/qg0GsO0iT7puGB:uh0I0yIYzFZ90Gstw
-
Detect Umbral payload
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1