General
-
Target
5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17
-
Size
1.8MB
-
Sample
241213-nxkw7ayqgq
-
MD5
58f824a8f6a71da8e9a1acc97fc26d52
-
SHA1
b0e199e6f85626edebbecd13609a011cf953df69
-
SHA256
5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17
-
SHA512
7d6c752369ea83bad34873d8603c413e9372ff66adcaad11e7f23d3ce85827e057444b30eadf927329191825aef4dc37a1e68c30b71fae4ce6f53708102fb461
-
SSDEEP
49152:OA12qngJy5Eptzh8wg9fmH5pKKMmDiuV:OHJyEptzh8n05QHwV
Static task
static1
Behavioral task
behavioral1
Sample
5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17.exe
Resource
win7-20241023-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:8080
101.99.92.189:8080
d5gQ6Zf7Tzih1Pi1
-
install_file
USB.exe
Extracted
umbral
https://discord.com/api/webhooks/1316854619615395900/Dn3bh1TbkCRewqpe_pn_K2IjK67e9nf96EdTjHeHaiQsm9N6qPmO7r5UKNDUemOXEcux
Targets
-
-
Target
5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17
-
Size
1.8MB
-
MD5
58f824a8f6a71da8e9a1acc97fc26d52
-
SHA1
b0e199e6f85626edebbecd13609a011cf953df69
-
SHA256
5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17
-
SHA512
7d6c752369ea83bad34873d8603c413e9372ff66adcaad11e7f23d3ce85827e057444b30eadf927329191825aef4dc37a1e68c30b71fae4ce6f53708102fb461
-
SSDEEP
49152:OA12qngJy5Eptzh8wg9fmH5pKKMmDiuV:OHJyEptzh8n05QHwV
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Umbral payload
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Umbral family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2