General
-
Target
BootstrapperNew.exe
-
Size
2.9MB
-
Sample
250304-nx186szsax
-
MD5
a5da11e4a285848ae515180014f45b31
-
SHA1
a9a3831a17d602f2aa1c2adf91328a1b639efe51
-
SHA256
f3e50131ad394cee77a2f242e521a30662bbfb670a459e151fea8916ca0c9bfa
-
SHA512
8d6bd11c484f967a79a9a5f07ed2e2fc5fba768e963de87d772fe1702a643f775641422f5399fa8a94e0c6ccaadfc7c690620fb72dfffb7e62d31aabbfb8a8ec
-
SSDEEP
49152:8NRJ4Dffl1NvzVQi91k3oTiQ+j07CM3hJfUNeGU76VNHYYO6gpls53NMCHoX:iqDfHtzi41HTJ+j0OofUNW767zgplK
Static task
static1
Malware Config
Extracted
xworm
5.0
127.0.0.1:36623
fax-scenarios.gl.at.ply.gg:36623
iq4Cbvqxc9yxmDW5
-
Install_directory
%AppData%
-
install_file
svchost.exe
Extracted
umbral
https://discord.com/api/webhooks/1345563602677141726/UETQM4AWjNBFBxXdR-mv-F7ECuO_Z-OofyNnLI5dWrFHlsYv4cmGa1-zg2Y-OdxgVf3d
Targets
-
-
Target
BootstrapperNew.exe
-
Size
2.9MB
-
MD5
a5da11e4a285848ae515180014f45b31
-
SHA1
a9a3831a17d602f2aa1c2adf91328a1b639efe51
-
SHA256
f3e50131ad394cee77a2f242e521a30662bbfb670a459e151fea8916ca0c9bfa
-
SHA512
8d6bd11c484f967a79a9a5f07ed2e2fc5fba768e963de87d772fe1702a643f775641422f5399fa8a94e0c6ccaadfc7c690620fb72dfffb7e62d31aabbfb8a8ec
-
SSDEEP
49152:8NRJ4Dffl1NvzVQi91k3oTiQ+j07CM3hJfUNeGU76VNHYYO6gpls53NMCHoX:iqDfHtzi41HTJ+j0OofUNW767zgplK
-
Detect Umbral payload
-
Detect Xworm Payload
-
Umbral family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1