General
-
Target
DDOS TOOL.rar
-
Size
5.2MB
-
Sample
241201-t3r6cawlfx
-
MD5
01abc57a648bfe6c15d0e60cee8df24d
-
SHA1
6879b1d3f182d046297a5a51e4629ac79e8eb9bb
-
SHA256
cc955efc8aaa3c26caa9b57604ee3bb2aa4039b946b8c2aea8e7d2579dab18c7
-
SHA512
9776436a6f4d0a61ee92d12955263ab6a7d40e86e79929956af8e314cb34a262e32efc46a2f11d09815dc8ed64d1fdda62cc42bcb526dc8dad2c5fb4ae0002e6
-
SSDEEP
98304:c+D78yvHmfPHf5ra0SobmnJolavV9sR/1ZfoW5Uxx5gw:c+TPE5rT6nKlS9E9a5gw
Static task
static1
Behavioral task
behavioral1
Sample
DDOS TOOL.rar
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
DDOS TOOL.rar
Resource
win10v2004-20241007-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1260642913709199370/cN_Wnccw0kdFSTwqONW2fMDnifHoEhjQp9n_8tPGu3gI5coO14fm3gGZ1Q04Hstg1nAO
Extracted
xworm
5.0
testarosa.duckdns.org:7110
5ZpeoOe6AtQfr6wU
-
Install_directory
%AppData%
-
install_file
Ondrive.exe
Extracted
njrat
0.7d
HacKed
147.185.221.20:49236
6a8a3b6e5450a823d542e748a454aa4c
-
reg_key
6a8a3b6e5450a823d542e748a454aa4c
-
splitter
|'|'|
Targets
-
-
Target
DDOS TOOL.rar
-
Size
5.2MB
-
MD5
01abc57a648bfe6c15d0e60cee8df24d
-
SHA1
6879b1d3f182d046297a5a51e4629ac79e8eb9bb
-
SHA256
cc955efc8aaa3c26caa9b57604ee3bb2aa4039b946b8c2aea8e7d2579dab18c7
-
SHA512
9776436a6f4d0a61ee92d12955263ab6a7d40e86e79929956af8e314cb34a262e32efc46a2f11d09815dc8ed64d1fdda62cc42bcb526dc8dad2c5fb4ae0002e6
-
SSDEEP
98304:c+D78yvHmfPHf5ra0SobmnJolavV9sR/1ZfoW5Uxx5gw:c+TPE5rT6nKlS9E9a5gw
-
Detect Umbral payload
-
Detect Xworm Payload
-
Njrat family
-
Umbral family
-
Xworm family
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1