General

  • Target

    RustAnticheat.rar

  • Size

    1.1MB

  • Sample

    241110-wqwzwa1pcs

  • MD5

    5a68fb7867991cdaf0ff478e5c5ecd93

  • SHA1

    acc566dcb7affa7441e4c03ac81c350c482918d3

  • SHA256

    91399415beee17d491d473ac161b7ea012308d1003e1977c6d20a97f45f92e8f

  • SHA512

    eda6ee8d6baedb1fb2a90b99ec5abdc9961650ab498714c0d6b0549b7f5ce6570ef3c0584d95e9f478a7f547d8bec72fed9134b12d50448fcb4dcf4f1db72561

  • SSDEEP

    24576:tQUbaA3uJQ7dZtGhEqfDBrJXRta3VzLHLL3QMgaQ6zDoBu:txbuiLshEurJXRGrL3QMgah1

Malware Config

Extracted

Family

xworm

C2

web-amend.gl.at.ply.gg:59501

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    RuntimeBroker.exe

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1293267568387297385/WnO2JpSDfCRQ711ulFEFqRGEAxQtGu6PY1WvGbXedBOHjDSr2YGy9Y9KUdqEG9zICeAa

Targets

    • Target

      RustAnticheat.exe

    • Size

      1.1MB

    • MD5

      4da1cae5b285cef6559d833dfdd47d97

    • SHA1

      b0a10457c591d30b6306cb93ecf78bea8e85c10f

    • SHA256

      c8debc191b353c4acc61bdc8c29df7b236067e8a8b609da656cc503d00fe1e25

    • SHA512

      f55526f2d77077f7dfec9d963170277aa947d1f07edf96f2846dc373c7349b9362d3d1b3b157bf34729746c9038f41a164c72e293501e66ce6cb40db875c7243

    • SSDEEP

      24576:r4feY2fpThsGUC+Krr90PvaOEO6ibCsBh0bpquR:0fp2fp1ZB+K0PvNEICvb

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks