General
-
Target
ConsoleApplication1.obf.exe
-
Size
424KB
-
Sample
231105-dvmmwsab9t
-
MD5
9764ad0ba2c14105efa6cb7462beda58
-
SHA1
40c717e44479d0460a2b1789dbaf61a648b038a9
-
SHA256
52770ec8f2e84b3e264870a7533286670e61bff2c8932f0cd6cc1f60af3323ae
-
SHA512
d5a5313f377d17a21ec485b6e8ef6ccc02864b4cda1e8c4d47c790a60e3f0430a8fdf482fcfe116b52fb063f298abd594ff9167c68ffda23f0c69fb84d299309
-
SSDEEP
6144:hY2cJFqVZloZM9rIkd8g+EtXHkv/iD4ZZACl98e1mbiB8BOaedF6IxI:OpJFqVroZOL+EP8h7nuMawF6
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1170536634891128902/hdNxkvpSxRXfW2ouud2imDE8eFbcAfoi3fBBxpcoRyxI8E-rxHT7NHLuI-Q-ThYq7M3H
Targets
-
-
Target
ConsoleApplication1.obf.exe
-
Size
424KB
-
MD5
9764ad0ba2c14105efa6cb7462beda58
-
SHA1
40c717e44479d0460a2b1789dbaf61a648b038a9
-
SHA256
52770ec8f2e84b3e264870a7533286670e61bff2c8932f0cd6cc1f60af3323ae
-
SHA512
d5a5313f377d17a21ec485b6e8ef6ccc02864b4cda1e8c4d47c790a60e3f0430a8fdf482fcfe116b52fb063f298abd594ff9167c68ffda23f0c69fb84d299309
-
SSDEEP
6144:hY2cJFqVZloZM9rIkd8g+EtXHkv/iD4ZZACl98e1mbiB8BOaedF6IxI:OpJFqVroZOL+EP8h7nuMawF6
-
Detect Umbral payload
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-