General
-
Target
RustAnticheat.exe
-
Size
1.1MB
-
Sample
250103-tvalbssnaz
-
MD5
2fbbfbb74dc5aaadcfd211cfeffe2436
-
SHA1
fabe364aa9a454fd4222a65208cc6e0ea20a055b
-
SHA256
20f227a3b9bb4366e5f33adc724f6bfe729148984dc320985a306099b9fa2f81
-
SHA512
f10ccf004653b8e8a05168b7045fd14247ca4d2e5d4917990129f5e9d0b8b3404bf19ae551e2cab3aaf0808d968c178b5b9b41df6e4527e11d8a3d2ab5e438ca
-
SSDEEP
24576:Ubgge3IgtiIefG+2xzN0Vx0Pn+ugXDHonXKmbolhyr9hv3V:Ue3IgwqJCfBrLo6mbolhq3V
Static task
static1
Behavioral task
behavioral1
Sample
RustAnticheat.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
say-bands.gl.at.ply.gg:41697
-
Install_directory
%Userprofile%
-
install_file
RuntimeBroker.exe
Extracted
umbral
https://discord.com/api/webhooks/1324773241721454592/0bNkfJfnFLKYK9qsZKNX46VZrdz9_Q66rDPONU09Nh8_1RKAs7tIVY9WGoMFggyLSmFd
Targets
-
-
Target
RustAnticheat.exe
-
Size
1.1MB
-
MD5
2fbbfbb74dc5aaadcfd211cfeffe2436
-
SHA1
fabe364aa9a454fd4222a65208cc6e0ea20a055b
-
SHA256
20f227a3b9bb4366e5f33adc724f6bfe729148984dc320985a306099b9fa2f81
-
SHA512
f10ccf004653b8e8a05168b7045fd14247ca4d2e5d4917990129f5e9d0b8b3404bf19ae551e2cab3aaf0808d968c178b5b9b41df6e4527e11d8a3d2ab5e438ca
-
SSDEEP
24576:Ubgge3IgtiIefG+2xzN0Vx0Pn+ugXDHonXKmbolhyr9hv3V:Ue3IgwqJCfBrLo6mbolhq3V
-
Detect Umbral payload
-
Detect Xworm Payload
-
Umbral family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1