General
-
Target
xworm.exe
-
Size
229KB
-
Sample
241009-zyc4hstgpr
-
MD5
c176d2ad8aae3ae3421647059931c8d9
-
SHA1
46cc2ff92c42f531cf2d41460031da365fd69a24
-
SHA256
8a9330937d476297cf95bed9cb50f4cb82ee90c8fd538e89090727538e2a50dc
-
SHA512
0739349b1a93f48d3600eb4d59ef4465e291270eaa7fb3c929c69ffd9d0f282c3305f1beec86e40f4a55ec13feb944fdf9ad4e0bdb2a2ad6a790dc6116386825
-
SSDEEP
6144:9loZM9rIkd8g+EtXHkv/iD4yeRV2U7X8ktoGnnGbBeb8e1mWbVi:foZOL+EP8yeRV2U7X8ktoGnnGbUE
Behavioral task
behavioral1
Sample
xworm.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1292588793349673046/QU5Tkt7I-mATnc_tzCGZ0VZ_k12Wy6MTyTCFvsp153ceb8hbq9trvdiFTqnX3WItql1t
Targets
-
-
Target
xworm.exe
-
Size
229KB
-
MD5
c176d2ad8aae3ae3421647059931c8d9
-
SHA1
46cc2ff92c42f531cf2d41460031da365fd69a24
-
SHA256
8a9330937d476297cf95bed9cb50f4cb82ee90c8fd538e89090727538e2a50dc
-
SHA512
0739349b1a93f48d3600eb4d59ef4465e291270eaa7fb3c929c69ffd9d0f282c3305f1beec86e40f4a55ec13feb944fdf9ad4e0bdb2a2ad6a790dc6116386825
-
SSDEEP
6144:9loZM9rIkd8g+EtXHkv/iD4yeRV2U7X8ktoGnnGbBeb8e1mWbVi:foZOL+EP8yeRV2U7X8ktoGnnGbUE
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1