General
-
Target
94a9aea0d58aed1c57e0f3857ea7de65778a6faab1912e4decbe463bf7b85ae8
-
Size
1.9MB
-
Sample
241229-x6l1aawkez
-
MD5
477ee009f176249987f15c8fd01902f0
-
SHA1
c40e6e81adcca5bf643ea005e3e2bc062793985d
-
SHA256
94a9aea0d58aed1c57e0f3857ea7de65778a6faab1912e4decbe463bf7b85ae8
-
SHA512
aef7538f615ec5607f56f41f17ad045a4ac8bba6e7a27e185068208a7ea704c01b1b87aaae0b5cb42f2e61ee11dd344e01c2f8d2d089a026e14931935da6dfef
-
SSDEEP
24576:IRDdNQlDWcG0ZbOOdezYwITkHiPIZp7WAvck0poRtf0BJngtcp90kcTFI8A+W4+u:IRDTQRzMKeEcHLZkA0ruJd/
Behavioral task
behavioral1
Sample
94a9aea0d58aed1c57e0f3857ea7de65778a6faab1912e4decbe463bf7b85ae8.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1322985421172641892/q0_diVrV3tWC0qMrnQumssRXcZ18yaPSUtiPWfKvRg2S6sXoeNRQ-lKC87d8pURrSvkv
Extracted
xworm
5.0
were-breeding.gl.at.ply.gg:1234
ecqG44OAn0ybERsL
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
94a9aea0d58aed1c57e0f3857ea7de65778a6faab1912e4decbe463bf7b85ae8
-
Size
1.9MB
-
MD5
477ee009f176249987f15c8fd01902f0
-
SHA1
c40e6e81adcca5bf643ea005e3e2bc062793985d
-
SHA256
94a9aea0d58aed1c57e0f3857ea7de65778a6faab1912e4decbe463bf7b85ae8
-
SHA512
aef7538f615ec5607f56f41f17ad045a4ac8bba6e7a27e185068208a7ea704c01b1b87aaae0b5cb42f2e61ee11dd344e01c2f8d2d089a026e14931935da6dfef
-
SSDEEP
24576:IRDdNQlDWcG0ZbOOdezYwITkHiPIZp7WAvck0poRtf0BJngtcp90kcTFI8A+W4+u:IRDTQRzMKeEcHLZkA0ruJd/
-
Detect Umbral payload
-
Detect Xworm Payload
-
Umbral family
-
Xworm family
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Peripheral Device Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2