General
-
Target
RustAnticheat (1).rar
-
Size
1.1MB
-
Sample
241008-vdb89syhrd
-
MD5
61b6860f5abe3fdaca02f3d382afd575
-
SHA1
d8c42a8e3b0f2c55499f267ae666e3cfa2d624fa
-
SHA256
1d7a3691eb81388e6e74174c07e91dbf2625e97a9fb4230f5abc2f5b60a9b3bf
-
SHA512
d28e58815b5370a01e87d12201bfb72dcf70e07066faeb4c4f42c3b3fb0404a72236d149b38446bd20c3388d4087a4eb9cf15ec50ea47346a0516d6a8c04c6e7
-
SSDEEP
24576:ofztvK7qry+iGbr6rf1+eZ4iaCaNqhhnwIShgygR+W6+rnp:izxFry+zerf1+e444ISzI+W64
Static task
static1
Behavioral task
behavioral1
Sample
RustAnticheat.exe
Resource
win7-20240708-en
Malware Config
Extracted
xworm
web-amend.gl.at.ply.gg:59501
-
Install_directory
%Userprofile%
-
install_file
USB.exe
Extracted
umbral
https://discord.com/api/webhooks/1291669307859664906/RUEPanQ47YYW363xEFskgjlXsec0mWWiNZ0HNCbO2N0KXACFaI1QIfW4FoUNLAcgE55h
Targets
-
-
Target
RustAnticheat.exe
-
Size
1.1MB
-
MD5
b323c7d5108d8ebfc2f4dd43eaaef61f
-
SHA1
1b829cd04387683200ea435d93649603673aeaa9
-
SHA256
e4fb965deeb173b026d2014ff589944cc6e811b1363368329dc4c08b3ffad039
-
SHA512
efd6e4c80d5bc150ce33141eefd5608db601567e1cd5f9f4d03171df2ebc5b8d510c152b2e952168788366370417c0de11e42440bd3d0d37c8d0042b879603e5
-
SSDEEP
24576:+1F5e87F6Kijp49YwhM1Y2CA9vwKBu3NqMvzQYFoaNIfpAKEf:qF5eZKijp+G1Y7AxwKBeQMv00occu
-
Detect Umbral payload
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1