Resubmissions
16-11-2023 14:41
231116-r2taxacd86 10General
-
Target
Chad Manager (QUEST).exe
-
Size
362KB
-
Sample
231116-r2taxacd86
-
MD5
cca5bab38fe75d3683b7355f1084007a
-
SHA1
c2f0c7ffd1cf73c0f2f4a6c881150e1cb78288c0
-
SHA256
d57da5841f0117edb2cd41d92c03de6385bbe69563abbcd902b8e09a111824e8
-
SHA512
afe550e0007e76483c84cf3d9c0341240f45d715bbb192fa04aa0ab55e7baf8cb2a0332267869a123c846cd1389ed060dfaec7ea8d40b6110f234965436b7fd9
-
SSDEEP
6144:PcyHIGadsUS0O3ulKjb8eNHOJZCDv4zMYAU:Pc+IG9/jR
Behavioral task
behavioral1
Sample
Chad Manager (QUEST).exe
Resource
win7-20231020-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1099530385500672010/v1L-vI2_V9Aqx-ynFN75S3tPemD4r2wKTC9J6RMsGD49q8zKhKwCqt6KEOb5mbuKSV1A
Targets
-
-
Target
Chad Manager (QUEST).exe
-
Size
362KB
-
MD5
cca5bab38fe75d3683b7355f1084007a
-
SHA1
c2f0c7ffd1cf73c0f2f4a6c881150e1cb78288c0
-
SHA256
d57da5841f0117edb2cd41d92c03de6385bbe69563abbcd902b8e09a111824e8
-
SHA512
afe550e0007e76483c84cf3d9c0341240f45d715bbb192fa04aa0ab55e7baf8cb2a0332267869a123c846cd1389ed060dfaec7ea8d40b6110f234965436b7fd9
-
SSDEEP
6144:PcyHIGadsUS0O3ulKjb8eNHOJZCDv4zMYAU:Pc+IG9/jR
-
Detect Umbral payload
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-