General
-
Target
RustAnticheat.rar
-
Size
1.1MB
-
Sample
241110-wqwzwa1pcs
-
MD5
5a68fb7867991cdaf0ff478e5c5ecd93
-
SHA1
acc566dcb7affa7441e4c03ac81c350c482918d3
-
SHA256
91399415beee17d491d473ac161b7ea012308d1003e1977c6d20a97f45f92e8f
-
SHA512
eda6ee8d6baedb1fb2a90b99ec5abdc9961650ab498714c0d6b0549b7f5ce6570ef3c0584d95e9f478a7f547d8bec72fed9134b12d50448fcb4dcf4f1db72561
-
SSDEEP
24576:tQUbaA3uJQ7dZtGhEqfDBrJXRta3VzLHLL3QMgaQ6zDoBu:txbuiLshEurJXRGrL3QMgah1
Static task
static1
Behavioral task
behavioral1
Sample
RustAnticheat.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
web-amend.gl.at.ply.gg:59501
-
Install_directory
%Userprofile%
-
install_file
RuntimeBroker.exe
Extracted
umbral
https://discord.com/api/webhooks/1293267568387297385/WnO2JpSDfCRQ711ulFEFqRGEAxQtGu6PY1WvGbXedBOHjDSr2YGy9Y9KUdqEG9zICeAa
Targets
-
-
Target
RustAnticheat.exe
-
Size
1.1MB
-
MD5
4da1cae5b285cef6559d833dfdd47d97
-
SHA1
b0a10457c591d30b6306cb93ecf78bea8e85c10f
-
SHA256
c8debc191b353c4acc61bdc8c29df7b236067e8a8b609da656cc503d00fe1e25
-
SHA512
f55526f2d77077f7dfec9d963170277aa947d1f07edf96f2846dc373c7349b9362d3d1b3b157bf34729746c9038f41a164c72e293501e66ce6cb40db875c7243
-
SSDEEP
24576:r4feY2fpThsGUC+Krr90PvaOEO6ibCsBh0bpquR:0fp2fp1ZB+K0PvNEICvb
-
Detect Umbral payload
-
Detect Xworm Payload
-
Umbral family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1