General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Family
umbral
C2
https://discord.com/api/webhooks/1143985649888788613/zoyRIm3l4Jki-ES8lYmfu8w6mv3jqVNkYxd7qjbaR_thgksX7b4V3te02L0FLA-bhujr
Targets
-
-
Target
https://mega.nz/file/PzJyyIha#VNaHZcXyZslIjowHIxHqPJBIE4qtkdh18yqX_r3-oNA
-
Detect Umbral payload
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-