General
-
Target
Umbral.exe
-
Size
229KB
-
Sample
240511-xgmwaafa58
-
MD5
518a530502d5793fddad2cf074af8850
-
SHA1
6ff6542721e9cf284129daf442c193911dda8367
-
SHA256
c9284451e9c756e38ee65feed1db743bc535066136851e71c707402607e06501
-
SHA512
232768823683c549468b0a11122a4c4831d528ad5861f1930714d9c7840405ac3fb145e7a8d85a3b14d6f92d93e41be692176755fb590bdfb6295cd80788c545
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4deC+pNbYMTgqL9Y0hBpb8e1meIi:noZtL+EP8deC+pNbYMTgqL9Y0h/R
Behavioral task
behavioral1
Sample
Umbral.exe
Resource
win7-20240215-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1237112288494747648/RwLhzmD0ehxDiBdZsbgoSXVKoOkldpfaRP7ikjkQV9Ya8EVVXay-1UF3yarrrtlSnrpv
Targets
-
-
Target
Umbral.exe
-
Size
229KB
-
MD5
518a530502d5793fddad2cf074af8850
-
SHA1
6ff6542721e9cf284129daf442c193911dda8367
-
SHA256
c9284451e9c756e38ee65feed1db743bc535066136851e71c707402607e06501
-
SHA512
232768823683c549468b0a11122a4c4831d528ad5861f1930714d9c7840405ac3fb145e7a8d85a3b14d6f92d93e41be692176755fb590bdfb6295cd80788c545
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4deC+pNbYMTgqL9Y0hBpb8e1meIi:noZtL+EP8deC+pNbYMTgqL9Y0h/R
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-