General
-
Target
fixer.bat
-
Size
259KB
-
Sample
241201-v7ftjsxlcv
-
MD5
63f3ebe3fe598479517c1843d1f05944
-
SHA1
4aaeed78293c47805595957cc3fa71d5fdd07d15
-
SHA256
48b14d5f105efa0097cc24de8bbf0c334da58906addc06a9a42fe8274d8759e2
-
SHA512
12d5f9c569812a7cef6838c64414757689ee811aecfbc21465b36c0bcecb755b8d75a5f5663bbc5e7d102532ed64cc788b370a00464869044e8576699d0b1e7b
-
SSDEEP
6144:SIujxg7ViKrBi4Jya9IlvpPxmbkdtEGQQ9ZGeRFBc81tx4Z:m8VTrBiuEpYI3EQzJRFB5GZ
Static task
static1
Malware Config
Extracted
xworm
5.0
cheflilou-43810.portmap.host:43810
q2m91QtHDnjEQolK
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
fixer.bat
-
Size
259KB
-
MD5
63f3ebe3fe598479517c1843d1f05944
-
SHA1
4aaeed78293c47805595957cc3fa71d5fdd07d15
-
SHA256
48b14d5f105efa0097cc24de8bbf0c334da58906addc06a9a42fe8274d8759e2
-
SHA512
12d5f9c569812a7cef6838c64414757689ee811aecfbc21465b36c0bcecb755b8d75a5f5663bbc5e7d102532ed64cc788b370a00464869044e8576699d0b1e7b
-
SSDEEP
6144:SIujxg7ViKrBi4Jya9IlvpPxmbkdtEGQQ9ZGeRFBc81tx4Z:m8VTrBiuEpYI3EQzJRFB5GZ
-
Detect Umbral payload
-
Detect Xworm Payload
-
Umbral family
-
Xworm family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Drops startup file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1