General

  • Target

    SwinDevline.exe

  • Size

    10.0MB

  • Sample

    241117-zm4gbsybpr

  • MD5

    5a677cba4cca1c95bff07c16a081f39f

  • SHA1

    3c306484f1e9896485f6653b3e86aec7236f507d

  • SHA256

    d88531b8ba4bb1392881fa983c6dd0dbee02285eb15584797b6005fb2971bd6e

  • SHA512

    3d64ee1b290faa24595282a817d6ff98389ba15986e6416cdd38052f1afd98957928157d809dc675c3148bf4c48cdf1fed497584dfa915bb8e977e438421dfce

  • SSDEEP

    12288:nIK4KNZCD1yOzO2NLco2RDyUZ3bKl/Cx:IwDCD1Lvwo2R5Z3u

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1300085879343153233/-ddJjNn1i9vwgELyTWzNUqmaTWlQC71HdSwW26fQ6Ghxxfakhp0E3VrmKBTPgrJlhUBm

Extracted

Family

xworm

C2

court-requires.gl.at.ply.gg:47045

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    AggentWidows.exe

Targets

    • Target

      SwinDevline.exe

    • Size

      10.0MB

    • MD5

      5a677cba4cca1c95bff07c16a081f39f

    • SHA1

      3c306484f1e9896485f6653b3e86aec7236f507d

    • SHA256

      d88531b8ba4bb1392881fa983c6dd0dbee02285eb15584797b6005fb2971bd6e

    • SHA512

      3d64ee1b290faa24595282a817d6ff98389ba15986e6416cdd38052f1afd98957928157d809dc675c3148bf4c48cdf1fed497584dfa915bb8e977e438421dfce

    • SSDEEP

      12288:nIK4KNZCD1yOzO2NLco2RDyUZ3bKl/Cx:IwDCD1Lvwo2R5Z3u

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks