General
-
Target
celestial.exe
-
Size
229KB
-
Sample
231010-2akjsshd24
-
MD5
d57ec258aaffb601a3594f9ac3a44b6d
-
SHA1
c4b592284058deda8356b1a66e80903ddbd00f1f
-
SHA256
de34cde65aade458fe105a3d66395848e4102a0d179d16e72d1538069faee469
-
SHA512
300cae33a20e9d17c2211ee88867b1395ee094eb34f0e25143914935bb0148a60f9f3f89e7184dd2c83cc5b74871edce617ee51c26320e1b61811c83a0400c2a
-
SSDEEP
6144:tloZMJrIkd8g+EtXHkv/iD4cME/EKtFuKr20VJg8qb8e1mQei:voZKL+EP8cME/EKtFuKr20VJgD3
Behavioral task
behavioral1
Sample
celestial.exe
Resource
win7-20230831-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1157520373731041442/PQ3PYR2iWvacWKQjBzHsdAMHU_8MoC0UkonegtnIRu0YzE9N4PjXFLLN_iDyQ7paADAA
Targets
-
-
Target
celestial.exe
-
Size
229KB
-
MD5
d57ec258aaffb601a3594f9ac3a44b6d
-
SHA1
c4b592284058deda8356b1a66e80903ddbd00f1f
-
SHA256
de34cde65aade458fe105a3d66395848e4102a0d179d16e72d1538069faee469
-
SHA512
300cae33a20e9d17c2211ee88867b1395ee094eb34f0e25143914935bb0148a60f9f3f89e7184dd2c83cc5b74871edce617ee51c26320e1b61811c83a0400c2a
-
SSDEEP
6144:tloZMJrIkd8g+EtXHkv/iD4cME/EKtFuKr20VJg8qb8e1mQei:voZKL+EP8cME/EKtFuKr20VJgD3
-
Detect Umbral payload
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-