General
-
Target
ExodusMiner.exe
-
Size
229KB
-
Sample
240211-yljj4ada32
-
MD5
610f270e3e1354a9e9cf73268e6d3835
-
SHA1
a5cbce545de815e3ff3ed7e2a74deb7dc059d85e
-
SHA256
3abc7ea28aaa722243f21aa1f31ea191961e91babe16432c69fbb413d8b9e924
-
SHA512
0ec59177be33aa54033b6f3081200500aa63e11c7df6990db9360f3d044ecd3ffb3d51370967c1e16fac03284e092cfd9bc41e04c9e76f953f786a1a54e9c55a
-
SSDEEP
6144:dloZMPrIkd8g+EtXHkv/iD4jrwQjpaC9lop7mGzOfdb8e1mtdi:/oZIL+EP8jrwQjpaC9lop7mGzO1M0
Behavioral task
behavioral1
Sample
ExodusMiner.exe
Resource
win7-20231129-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1205845501723811940/_aoOhJY0iv9RK-gjJERpdLz95KQLHziIrC0GV03Ze55mYrNXD8Z0d2Kd6p_x2j4rPiad
Targets
-
-
Target
ExodusMiner.exe
-
Size
229KB
-
MD5
610f270e3e1354a9e9cf73268e6d3835
-
SHA1
a5cbce545de815e3ff3ed7e2a74deb7dc059d85e
-
SHA256
3abc7ea28aaa722243f21aa1f31ea191961e91babe16432c69fbb413d8b9e924
-
SHA512
0ec59177be33aa54033b6f3081200500aa63e11c7df6990db9360f3d044ecd3ffb3d51370967c1e16fac03284e092cfd9bc41e04c9e76f953f786a1a54e9c55a
-
SSDEEP
6144:dloZMPrIkd8g+EtXHkv/iD4jrwQjpaC9lop7mGzOfdb8e1mtdi:/oZIL+EP8jrwQjpaC9lop7mGzO1M0
-
Detect Umbral payload
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-