General

  • Target

    MCLauncherAlpha.rar

  • Size

    164KB

  • Sample

    250107-tbclksxnhz

  • MD5

    27e7b6d7788808feb521a6f18a0bf340

  • SHA1

    348a268a83e15fee4f083ae2c2f52ddcecb96525

  • SHA256

    1a6b852b573aac6a87f4cfd55f3694c5ad2563746f962ccdb8cb22b9dfc4873c

  • SHA512

    cd685773c201318d8b2f28af09e1bec9955695cf48a27f65f9332e19b3dcaae95506bc8bb521a7147e5d83996dadc6b57b7f4727a1ad4e77a33b7d7dbbd2ed9a

  • SSDEEP

    3072:55Bsy9Vo9TOS4eXiM9U7araGZRbFEW3VEoKWd6Bl+2UztN:5XVgTgeBUuraGZXE6VEoKWABl+/

Malware Config

Extracted

Family

xworm

C2

who-disaster.gl.at.ply.gg:1754

Attributes
  • Install_directory

    %AppData%

  • install_file

    nursultan.exe

Targets

    • Target

      MCLauncherAlpha.exe

    • Size

      25.2MB

    • MD5

      f7bd3d4ec4df43f3746dc4ee40182583

    • SHA1

      5bed51610fc47545a6d0b6a480c5fa79c93c41da

    • SHA256

      befad7b4dd58e164807088abae4876eec9cf413f997979b44d54522117a326de

    • SHA512

      d5a32bf7eff40e1d0e4c73c22afea7822fb34fb748962ce131788b345c741814ade9b2e7bf75b794bb63d0f6b415296e2f12a82ae0e7b594f9f1bedb4bc33026

    • SSDEEP

      12288:oxH78xBtJoZtL+EP8LhB0xfEY3Ymfh8Itps0Jd:oGB1I89B0xfEY3Ymfh8Itps0r

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks