General

  • Target

    RustAnticheat (1).rar

  • Size

    1.1MB

  • Sample

    241008-vdb89syhrd

  • MD5

    61b6860f5abe3fdaca02f3d382afd575

  • SHA1

    d8c42a8e3b0f2c55499f267ae666e3cfa2d624fa

  • SHA256

    1d7a3691eb81388e6e74174c07e91dbf2625e97a9fb4230f5abc2f5b60a9b3bf

  • SHA512

    d28e58815b5370a01e87d12201bfb72dcf70e07066faeb4c4f42c3b3fb0404a72236d149b38446bd20c3388d4087a4eb9cf15ec50ea47346a0516d6a8c04c6e7

  • SSDEEP

    24576:ofztvK7qry+iGbr6rf1+eZ4iaCaNqhhnwIShgygR+W6+rnp:izxFry+zerf1+e444ISzI+W64

Malware Config

Extracted

Family

xworm

C2

web-amend.gl.at.ply.gg:59501

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    USB.exe

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1291669307859664906/RUEPanQ47YYW363xEFskgjlXsec0mWWiNZ0HNCbO2N0KXACFaI1QIfW4FoUNLAcgE55h

Targets

    • Target

      RustAnticheat.exe

    • Size

      1.1MB

    • MD5

      b323c7d5108d8ebfc2f4dd43eaaef61f

    • SHA1

      1b829cd04387683200ea435d93649603673aeaa9

    • SHA256

      e4fb965deeb173b026d2014ff589944cc6e811b1363368329dc4c08b3ffad039

    • SHA512

      efd6e4c80d5bc150ce33141eefd5608db601567e1cd5f9f4d03171df2ebc5b8d510c152b2e952168788366370417c0de11e42440bd3d0d37c8d0042b879603e5

    • SSDEEP

      24576:+1F5e87F6Kijp49YwhM1Y2CA9vwKBu3NqMvzQYFoaNIfpAKEf:qF5eZKijp+G1Y7AxwKBeQMv00occu

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks