General
-
Target
External discord.gg61.exe
-
Size
229KB
-
Sample
240510-wk3v8sdb52
-
MD5
1b3fa21117b5da00f973089c28f2039e
-
SHA1
7c57451a38edab8b758e6343415aad2037ea6603
-
SHA256
b578fa1cba248ad18bd23bf52c3ac0727fca85c7415bb26ca6d7093e04a8045b
-
SHA512
b1fc5e584b2f67d52f0378b2870df950220e20d68d5ef33208eed76ece08f7984497f0499d2ba801d288b04d22ebd5877e681fde08fe019c290089f0b903c9cd
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4yLYussyVtGITOMdRYC+b8e1mDMi:noZtL+EP8yL/ssyVtGITOMdRYtCF
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1237446172554297375/cxTKcx8dwZQW37CjJD7okYeib5aGse1r1E4yOCQ5wfC2nVcrxv95R7DUMyLVPLMxN-jz
Targets
-
-
Target
External discord.gg61.exe
-
Size
229KB
-
MD5
1b3fa21117b5da00f973089c28f2039e
-
SHA1
7c57451a38edab8b758e6343415aad2037ea6603
-
SHA256
b578fa1cba248ad18bd23bf52c3ac0727fca85c7415bb26ca6d7093e04a8045b
-
SHA512
b1fc5e584b2f67d52f0378b2870df950220e20d68d5ef33208eed76ece08f7984497f0499d2ba801d288b04d22ebd5877e681fde08fe019c290089f0b903c9cd
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4yLYussyVtGITOMdRYC+b8e1mDMi:noZtL+EP8yL/ssyVtGITOMdRYtCF
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-