General
-
Target
Spoofer.exe
-
Size
231KB
-
Sample
240209-1pwpyage84
-
MD5
c964c96a473bbd29377a62c0d6e1d100
-
SHA1
879c4eebdfce76f13a2be8209c5b1ce3676152ef
-
SHA256
e6ce3dd93c2d407085ea10bb6f22bd89a34e7fff719e5579ee47f4f2fdaed921
-
SHA512
36e472d0b7d34a3b9968eb4c540cf839592df4b1147c1063fd0be4b72748cd48c0d8d46ef5cb6949932844951cd2f2dc5de7fdecbc98fc232958fe285813cf95
-
SSDEEP
6144:xloZM9rIkd8g+EtXHkv/iD4085oBPUon6WvRsY9+N0C8e1mkHi:DoZOL+EP8085oBPUon6WvRsY9eHC
Behavioral task
behavioral1
Sample
Spoofer.exe
Resource
win7-20231129-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1204353033006219314/vMrQARyQ3z_ff19Od3padG4gaMpg3BavD-KUV8yUJkYN1H6BIAYFbCU0q1jE4YP0wnk4
Targets
-
-
Target
Spoofer.exe
-
Size
231KB
-
MD5
c964c96a473bbd29377a62c0d6e1d100
-
SHA1
879c4eebdfce76f13a2be8209c5b1ce3676152ef
-
SHA256
e6ce3dd93c2d407085ea10bb6f22bd89a34e7fff719e5579ee47f4f2fdaed921
-
SHA512
36e472d0b7d34a3b9968eb4c540cf839592df4b1147c1063fd0be4b72748cd48c0d8d46ef5cb6949932844951cd2f2dc5de7fdecbc98fc232958fe285813cf95
-
SSDEEP
6144:xloZM9rIkd8g+EtXHkv/iD4085oBPUon6WvRsY9+N0C8e1mkHi:DoZOL+EP8085oBPUon6WvRsY9eHC
-
Detect Umbral payload
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-