General
-
Target
spoofer.exe
-
Size
442KB
-
Sample
240119-19mmrsfbe8
-
MD5
d5a84036071756dee960de255bd6ab94
-
SHA1
83b439582a8f3392f18dde97b56d937c518b1cd2
-
SHA256
5cac485680e36e9e3cea0867d1373edff3a8995a20d21a2b7aa38247a0a3eb1d
-
SHA512
fe0dec1e8422d9dd74431ccccff23e7083d356498ff98dc1c5680e1553c5145dbf1c854e48263c5d58a18c87c7bc7016294518ec1491045da7f62c1077a07779
-
SSDEEP
12288:3o0NHvykT8QNmJCDWs2qUa3zYgNl3Qc65snvJ:3phFT8QC6WsVUM7NxQcsaJ
Static task
static1
Behavioral task
behavioral1
Sample
spoofer.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
spoofer.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
discordrat
-
discord_token
MTE5MzczNzA3MzIzNzE4MDQyNg.GQDWc0.k4Yc3XgNEdmji15f8P6ui2A0sVB2zvpOmkNPlw
-
server_id
1196510448573489273
Extracted
umbral
https://ptb.discord.com/api/webhooks/1197286741825048616/mPoY62Pti_IE-hGcDYD9Kd5GhKzKQHzuySPby-xlg9GCRDWrviTGJ9au_QMU1pKDVh50
Targets
-
-
Target
spoofer.exe
-
Size
442KB
-
MD5
d5a84036071756dee960de255bd6ab94
-
SHA1
83b439582a8f3392f18dde97b56d937c518b1cd2
-
SHA256
5cac485680e36e9e3cea0867d1373edff3a8995a20d21a2b7aa38247a0a3eb1d
-
SHA512
fe0dec1e8422d9dd74431ccccff23e7083d356498ff98dc1c5680e1553c5145dbf1c854e48263c5d58a18c87c7bc7016294518ec1491045da7f62c1077a07779
-
SSDEEP
12288:3o0NHvykT8QNmJCDWs2qUa3zYgNl3Qc65snvJ:3phFT8QC6WsVUM7NxQcsaJ
-
Detect Umbral payload
-
Modifies security service
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-