General
-
Target
NursultanCrack.rar
-
Size
183KB
-
Sample
240316-xve3lahg7x
-
MD5
d3ad8d4ecbadea0a2ba6a92e91ed2d2b
-
SHA1
977368283f90605be222c310d6880fab8478ad7a
-
SHA256
b9395c6223dd34cdd95dd5c298eb609a806b12f2f2bcf9b0932b47ab564ee591
-
SHA512
1bd24793905cfd2bad5c2640e1b2f99bc4e7424cb7f6c17a42f69ec3bc04e1aed667d70d94ea4b1b616d3742023742dac60c3714f421402aeecba75ad09e3ba1
-
SSDEEP
3072:ngYU/sh31YoZfxYguGUb+MTezWxURWy0i9WQcM2ojNZbO/9GM69LOAalm2tJM:gWzuvG++geKQWyZ9okLO/956djalvM
Static task
static1
Behavioral task
behavioral1
Sample
minecraft.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
minecraft.jar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
start.exe
Resource
win7-20240221-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1218605453374914620/OdDYjKWd2x_sgrT_0JmzryiFvoGTz03pvb7F84neOCAte6YtS3TcUiq7-D1K38B9s0T8
Targets
-
-
Target
minecraft.jar
-
Size
1.4MB
-
MD5
90a312993c010c97b4ed7499bf5298f8
-
SHA1
d16dc6ba2bf420d0be5197029c31e41b14adf7dc
-
SHA256
80ac5f0776e7c7cd7bd4971e884e2233bde1bd5b51441e34109dbf717e73b672
-
SHA512
d3196d0ffa7969a4ccf7feac5eb21f94f9a9fc1fb7fef004726332b8365f7405497e57db523ab63c93218cf7e48ef1d62411dcc84d5f203a975ea42a4751826a
-
SSDEEP
3:7DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDr:H
Score1/10 -
-
-
Target
start.exe
-
Size
192KB
-
MD5
066f7f594bf6f254748bc19562dd1bc3
-
SHA1
313883f4a7fbfc3c60b153492aeefb927c5d5694
-
SHA256
9398c6385a5246fe4b86b0f247ddb8a93a9c326389dabef1b96bd65af09b360e
-
SHA512
04f0c82938dee7a790876ab39282c36eda0c6de11a337d93f728c07be6ff5997605c6a9bba886b94091c313795ee19bf96d65ca9ac1e1d62eeab7acd33b6afca
-
SSDEEP
6144:i0mlbUZ0lzEhoPkoaHOw4D/dB8H2HSZRw5:0aCESPkpHNi/bX
-
Detect Umbral payload
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-