General
-
Target
3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54
-
Size
144KB
-
Sample
241226-3pykmsvnhx
-
MD5
9e092ddaae5a606aa7562aefa6d19193
-
SHA1
f89629fc9325aa4e18563b9fb37d9b01e404e954
-
SHA256
3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54
-
SHA512
477a5cace00bb9fe1322f80f73b4f55da96ca8b43fbb735853568c406358ea47d68f575eadff34d878ba58d576129e6f007d661138e8d43bd703c201e7aee382
-
SSDEEP
3072:ICjy4wEgSRZg6tYJbpVOfraR+wS8WurzkMXEe99:nwhmOCYJb/EraRVS8l59
Static task
static1
Behavioral task
behavioral1
Sample
3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
127.0.0.1:46732
listing-repository.gl.at.ply.gg:46732
-
Install_directory
%Userprofile%
-
install_file
svchost.exe
Extracted
umbral
https://discord.com/api/webhooks/1321219981534298203/2bX3Cg6xbwKu45g5JAiVdKvMjVgYAyc-dGKLvybGhQzK_1h1Jt7szxeJv6nKrIMpNnXN
Targets
-
-
Target
3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54
-
Size
144KB
-
MD5
9e092ddaae5a606aa7562aefa6d19193
-
SHA1
f89629fc9325aa4e18563b9fb37d9b01e404e954
-
SHA256
3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54
-
SHA512
477a5cace00bb9fe1322f80f73b4f55da96ca8b43fbb735853568c406358ea47d68f575eadff34d878ba58d576129e6f007d661138e8d43bd703c201e7aee382
-
SSDEEP
3072:ICjy4wEgSRZg6tYJbpVOfraR+wS8WurzkMXEe99:nwhmOCYJb/EraRVS8l59
-
Detect Umbral payload
-
Detect Xworm Payload
-
Umbral family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1