General
-
Target
sinfulsassist.exe
-
Size
232KB
-
Sample
240220-bd4tqsha47
-
MD5
6bd66ae3d6ad55de0d3bfd026ab642f8
-
SHA1
b9c03630edcb053a0f14970ea7085a8a2a285d8a
-
SHA256
80e1636664daed3c4c919584a40b1404807ff859fcb98267abdbe487c9a16c1f
-
SHA512
c776fe3939329bfd47c447d069f89976acedb90853ab3d16386afab6123c7f1dfd9aadbbefa458226c4065452fdfd6d5dfc0a8162950d65818d7039ab92513fa
-
SSDEEP
6144:tloZMArIkd8g+EtXHkv/iD4xR8KfVealwgRj++71Nb8e1mRi:voZHL+EP8xR8KfVealwgRj++7X3
Behavioral task
behavioral1
Sample
sinfulsassist.exe
Resource
win7-20231215-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1209300482791571506/jtacisBH4RYssA6FXpFMLRZUsTlqXPQd2aCkNsLdrWFR1ebSB4aNFfCmGPwZyjCk-eaH
Targets
-
-
Target
sinfulsassist.exe
-
Size
232KB
-
MD5
6bd66ae3d6ad55de0d3bfd026ab642f8
-
SHA1
b9c03630edcb053a0f14970ea7085a8a2a285d8a
-
SHA256
80e1636664daed3c4c919584a40b1404807ff859fcb98267abdbe487c9a16c1f
-
SHA512
c776fe3939329bfd47c447d069f89976acedb90853ab3d16386afab6123c7f1dfd9aadbbefa458226c4065452fdfd6d5dfc0a8162950d65818d7039ab92513fa
-
SSDEEP
6144:tloZMArIkd8g+EtXHkv/iD4xR8KfVealwgRj++71Nb8e1mRi:voZHL+EP8xR8KfVealwgRj++7X3
-
Detect Umbral payload
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-