General
-
Target
BootstrapperNew.exe
-
Size
3.2MB
-
Sample
250302-b4a94sznz2
-
MD5
7e5b05edd4fc5123a6156664e4c37163
-
SHA1
c686009d9f8a4d4c66236c77bbc3d7a0380e4bb7
-
SHA256
eed32abbafc11dcb93a5657cc4a5c651d620b4be6fb935e322de765d3d005b16
-
SHA512
5bab95aa627fe696f05d0d6ebd77e43050b9071e1d753c08e52fe85338018163e773ff8d638c07d789030315ba75ec5379ce55858a4ede72e2db08049b3d9311
-
SSDEEP
98304:zOq7GTRgy8ao7iHl5CjjTwL1cLoGkqI2ouIAS:ibRSVECVkX8
Static task
static1
Malware Config
Extracted
xworm
127.0.0.1:34930
minimum-ball.gl.at.ply.gg:34930
-
Install_directory
%AppData%
-
install_file
SolaraX.exe
Targets
-
-
Target
BootstrapperNew.exe
-
Size
3.2MB
-
MD5
7e5b05edd4fc5123a6156664e4c37163
-
SHA1
c686009d9f8a4d4c66236c77bbc3d7a0380e4bb7
-
SHA256
eed32abbafc11dcb93a5657cc4a5c651d620b4be6fb935e322de765d3d005b16
-
SHA512
5bab95aa627fe696f05d0d6ebd77e43050b9071e1d753c08e52fe85338018163e773ff8d638c07d789030315ba75ec5379ce55858a4ede72e2db08049b3d9311
-
SSDEEP
98304:zOq7GTRgy8ao7iHl5CjjTwL1cLoGkqI2ouIAS:ibRSVECVkX8
-
Detect Umbral payload
-
Detect Xworm Payload
-
Umbral family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1