General
-
Target
MCLauncherAlpha.rar
-
Size
164KB
-
Sample
250107-tbclksxnhz
-
MD5
27e7b6d7788808feb521a6f18a0bf340
-
SHA1
348a268a83e15fee4f083ae2c2f52ddcecb96525
-
SHA256
1a6b852b573aac6a87f4cfd55f3694c5ad2563746f962ccdb8cb22b9dfc4873c
-
SHA512
cd685773c201318d8b2f28af09e1bec9955695cf48a27f65f9332e19b3dcaae95506bc8bb521a7147e5d83996dadc6b57b7f4727a1ad4e77a33b7d7dbbd2ed9a
-
SSDEEP
3072:55Bsy9Vo9TOS4eXiM9U7araGZRbFEW3VEoKWd6Bl+2UztN:5XVgTgeBUuraGZXE6VEoKWABl+/
Malware Config
Extracted
xworm
who-disaster.gl.at.ply.gg:1754
-
Install_directory
%AppData%
-
install_file
nursultan.exe
Targets
-
-
Target
MCLauncherAlpha.exe
-
Size
25.2MB
-
MD5
f7bd3d4ec4df43f3746dc4ee40182583
-
SHA1
5bed51610fc47545a6d0b6a480c5fa79c93c41da
-
SHA256
befad7b4dd58e164807088abae4876eec9cf413f997979b44d54522117a326de
-
SHA512
d5a32bf7eff40e1d0e4c73c22afea7822fb34fb748962ce131788b345c741814ade9b2e7bf75b794bb63d0f6b415296e2f12a82ae0e7b594f9f1bedb4bc33026
-
SSDEEP
12288:oxH78xBtJoZtL+EP8LhB0xfEY3Ymfh8Itps0Jd:oGB1I89B0xfEY3Ymfh8Itps0r
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Umbral payload
-
Detect Xworm Payload
-
Umbral family
-
Xworm family
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1