General
-
Target
https://cryptocurrencysplcfx.com/map/Allergy_document.pdf.zip
-
Sample
230807-gk3g5sdh24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cryptocurrencysplcfx.com/map/Allergy_document.pdf.zip
Resource
win10v2004-20230703-en
windows10-2004-x64
18 signatures
150 seconds
Malware Config
Extracted
Family
umbral
C2
https://discord.com/api/webhooks/1136289516206956546/U2aS5CJPqDV1OobfbiAj6zpDaSbZlgUvoBEbI_xUq34ib1t_tYhlgrzbNXjwKp7QL65n
Extracted
Family
asyncrat
Version
5.0.5
Botnet
Venom Clients
C2
89.23.101.38:5306
Mutex
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Targets
-
-
Target
https://cryptocurrencysplcfx.com/map/Allergy_document.pdf.zip
-
Detect Umbral payload
-
Async RAT payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-