General
-
Target
NEAS.0aece04789b6892b13e1985bb08a7200.exe
-
Size
278KB
-
Sample
231111-a69d9adb48
-
MD5
0aece04789b6892b13e1985bb08a7200
-
SHA1
49339cc3e987f517ab8ec2e6cb1baa19fbbc675f
-
SHA256
a6c6b2a4d581d6f5f1e661b0d0e390107ea79a7075700e48cfe41442c1e2eb06
-
SHA512
4d15c6bfd7c32f34fbbbb63cb4e974cd6f0d45f8f42605c4778cfb6dfccf527fa668717f70d955784e46899815a7a030cbe48616c0b93fe1825e80dfd5ca8b9d
-
SSDEEP
6144:pLGrA0UloZM9rIkd8g+EtXHkv/iD4ZZACl98e1mbix:eA0SoZOL+EP8h7n
Behavioral task
behavioral1
Sample
NEAS.0aece04789b6892b13e1985bb08a7200.exe
Resource
win7-20231025-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1170536634891128902/hdNxkvpSxRXfW2ouud2imDE8eFbcAfoi3fBBxpcoRyxI8E-rxHT7NHLuI-Q-ThYq7M3H
Targets
-
-
Target
NEAS.0aece04789b6892b13e1985bb08a7200.exe
-
Size
278KB
-
MD5
0aece04789b6892b13e1985bb08a7200
-
SHA1
49339cc3e987f517ab8ec2e6cb1baa19fbbc675f
-
SHA256
a6c6b2a4d581d6f5f1e661b0d0e390107ea79a7075700e48cfe41442c1e2eb06
-
SHA512
4d15c6bfd7c32f34fbbbb63cb4e974cd6f0d45f8f42605c4778cfb6dfccf527fa668717f70d955784e46899815a7a030cbe48616c0b93fe1825e80dfd5ca8b9d
-
SSDEEP
6144:pLGrA0UloZM9rIkd8g+EtXHkv/iD4ZZACl98e1mbix:eA0SoZOL+EP8h7n
-
Detect Umbral payload
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-