General

  • Target

    xworm.exe

  • Size

    229KB

  • Sample

    241009-zyc4hstgpr

  • MD5

    c176d2ad8aae3ae3421647059931c8d9

  • SHA1

    46cc2ff92c42f531cf2d41460031da365fd69a24

  • SHA256

    8a9330937d476297cf95bed9cb50f4cb82ee90c8fd538e89090727538e2a50dc

  • SHA512

    0739349b1a93f48d3600eb4d59ef4465e291270eaa7fb3c929c69ffd9d0f282c3305f1beec86e40f4a55ec13feb944fdf9ad4e0bdb2a2ad6a790dc6116386825

  • SSDEEP

    6144:9loZM9rIkd8g+EtXHkv/iD4yeRV2U7X8ktoGnnGbBeb8e1mWbVi:foZOL+EP8yeRV2U7X8ktoGnnGbUE

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1292588793349673046/QU5Tkt7I-mATnc_tzCGZ0VZ_k12Wy6MTyTCFvsp153ceb8hbq9trvdiFTqnX3WItql1t

Targets

    • Target

      xworm.exe

    • Size

      229KB

    • MD5

      c176d2ad8aae3ae3421647059931c8d9

    • SHA1

      46cc2ff92c42f531cf2d41460031da365fd69a24

    • SHA256

      8a9330937d476297cf95bed9cb50f4cb82ee90c8fd538e89090727538e2a50dc

    • SHA512

      0739349b1a93f48d3600eb4d59ef4465e291270eaa7fb3c929c69ffd9d0f282c3305f1beec86e40f4a55ec13feb944fdf9ad4e0bdb2a2ad6a790dc6116386825

    • SSDEEP

      6144:9loZM9rIkd8g+EtXHkv/iD4yeRV2U7X8ktoGnnGbBeb8e1mWbVi:foZOL+EP8yeRV2U7X8ktoGnnGbUE

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks