General

  • Target

    Aim_No_Recoil.bat

  • Size

    1KB

  • Sample

    250212-xf9nnasrgv

  • MD5

    42b088711bf592347c0f48e8f791faf1

  • SHA1

    4ab3a3361284f35a626e2f06844eeb3e6e22dccc

  • SHA256

    9a3a79c058974896eb02b3f58409e441fb0e7dc6a391269001fdf7fb3aaaae19

  • SHA512

    59e4c9eb7d0a72f305797f4ab408d836af6497e2a4ae032f2dcdec16fbd875119e235daf40b2f0a546e039797230f94c0f571b87873778d3bfc41bcf2b6142e7

Malware Config

Extracted

Family

xworm

Version

3.1

C2

185.172.175.125:5000

Mutex

Uto2xJheY5reQlME

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      Aim_No_Recoil.bat

    • Size

      1KB

    • MD5

      42b088711bf592347c0f48e8f791faf1

    • SHA1

      4ab3a3361284f35a626e2f06844eeb3e6e22dccc

    • SHA256

      9a3a79c058974896eb02b3f58409e441fb0e7dc6a391269001fdf7fb3aaaae19

    • SHA512

      59e4c9eb7d0a72f305797f4ab408d836af6497e2a4ae032f2dcdec16fbd875119e235daf40b2f0a546e039797230f94c0f571b87873778d3bfc41bcf2b6142e7

    • Detect Umbral payload

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks