General
-
Target
asdaw.zip
-
Size
1.2MB
-
Sample
240514-cn4gdsfa6y
-
MD5
6da8ae1fced623eb19b87d433b42e3f2
-
SHA1
c24d259ab8d918b9684073f7e9b6ff08fa411146
-
SHA256
ea24a1aae83844683cbff898b52368d08ea8727855ea1478570745727cdac30a
-
SHA512
e5025c4080e8caa726b80331b471ca80dc2da2959871752df239e67060dcc7a3f47c4a0e5a8a2717860decd432e833282722f17e77ef0583a8246bcbc7b4aea5
-
SSDEEP
12288:zp+h1POjmw5rA9ttGWsHOC4aUODwk5bbcSvH8fZ48rvj6:zp+h1WYfZBj6
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1233439262771515533/StaLUQOk6fesQAC6do8J2TvpMCRKBj7Mlo5ZRurU5EoQ6VPV6ANYC5mro9NHnKsZHZ2h
Targets
-
-
Target
PeIDK890XoXo.exe
-
Size
265KB
-
MD5
5920cf2aaa91ab76acd20fd132972402
-
SHA1
4f3d461f1b419839e4527f0e21b5779685c63e27
-
SHA256
8c7cc262eeb367bf7a4fb1539c0af24a2c363930249e8945048808c27fe687c5
-
SHA512
bb3b0ea84a232c7d6bde426f5da5ef15fcaba4227a705b727e9e6e0a45a3a5b819a7be309f542b6574f3d351accd34d5c131d186b5a352ba0c263113faceb9d5
-
SSDEEP
6144:FloZM+rIkd8g+EtXHkv/iD4M1vvGELns4d42X3WxRb8e1mUi2k:HoZtL+EP8M1vvGELns4d42X3Wz62k
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-