General
-
Target
RobloxUpdate.exe
-
Size
231KB
-
Sample
230911-vedhqahb8y
-
MD5
e888706c3bb06f4ca5ee2476c4669a32
-
SHA1
e8caccdcd618f82a4eae6aca13ed308391f58cde
-
SHA256
f68e296a7e54e54985e8748b9b5308dbf92cca51c602fedddeb25759eb88c72a
-
SHA512
1809ce5a99059b107cd15fe9ad82c986b904965460edfaa57d1ca6e542f0d0cf63ee95e26a5473c9f9fd9105f0c97105230ee6e62ff01193ee828f821f7bb79b
-
SSDEEP
6144:RloZM9rIkd8g+EtXHkv/iD4LzazJ16aB8e1mPi:joZOL+EP8LzazJ9Z
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1150835675596333117/o-JcAkkZgW95Q4k_Ci9OvJOZ6J11KjhlCP6vR_0yruo3pNrw3PlpA2F1Jggqgax_hraX
Targets
-
-
Target
RobloxUpdate.exe
-
Size
231KB
-
MD5
e888706c3bb06f4ca5ee2476c4669a32
-
SHA1
e8caccdcd618f82a4eae6aca13ed308391f58cde
-
SHA256
f68e296a7e54e54985e8748b9b5308dbf92cca51c602fedddeb25759eb88c72a
-
SHA512
1809ce5a99059b107cd15fe9ad82c986b904965460edfaa57d1ca6e542f0d0cf63ee95e26a5473c9f9fd9105f0c97105230ee6e62ff01193ee828f821f7bb79b
-
SSDEEP
6144:RloZM9rIkd8g+EtXHkv/iD4LzazJ16aB8e1mPi:joZOL+EP8LzazJ9Z
-
Detect Umbral payload
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-