General

  • Target

    BootstrapperNew.exe

  • Size

    2.9MB

  • Sample

    250304-nx186szsax

  • MD5

    a5da11e4a285848ae515180014f45b31

  • SHA1

    a9a3831a17d602f2aa1c2adf91328a1b639efe51

  • SHA256

    f3e50131ad394cee77a2f242e521a30662bbfb670a459e151fea8916ca0c9bfa

  • SHA512

    8d6bd11c484f967a79a9a5f07ed2e2fc5fba768e963de87d772fe1702a643f775641422f5399fa8a94e0c6ccaadfc7c690620fb72dfffb7e62d31aabbfb8a8ec

  • SSDEEP

    49152:8NRJ4Dffl1NvzVQi91k3oTiQ+j07CM3hJfUNeGU76VNHYYO6gpls53NMCHoX:iqDfHtzi41HTJ+j0OofUNW767zgplK

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:36623

fax-scenarios.gl.at.ply.gg:36623

Mutex

iq4Cbvqxc9yxmDW5

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

aes.plain

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1345563602677141726/UETQM4AWjNBFBxXdR-mv-F7ECuO_Z-OofyNnLI5dWrFHlsYv4cmGa1-zg2Y-OdxgVf3d

Targets

    • Target

      BootstrapperNew.exe

    • Size

      2.9MB

    • MD5

      a5da11e4a285848ae515180014f45b31

    • SHA1

      a9a3831a17d602f2aa1c2adf91328a1b639efe51

    • SHA256

      f3e50131ad394cee77a2f242e521a30662bbfb670a459e151fea8916ca0c9bfa

    • SHA512

      8d6bd11c484f967a79a9a5f07ed2e2fc5fba768e963de87d772fe1702a643f775641422f5399fa8a94e0c6ccaadfc7c690620fb72dfffb7e62d31aabbfb8a8ec

    • SSDEEP

      49152:8NRJ4Dffl1NvzVQi91k3oTiQ+j07CM3hJfUNeGU76VNHYYO6gpls53NMCHoX:iqDfHtzi41HTJ+j0OofUNW767zgplK

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks