General
-
Target
MinecraftCheat.exe
-
Size
231KB
-
Sample
240605-mx6m8ade3t
-
MD5
20384d9a8661d8d1c6baeba964939ba0
-
SHA1
e44f61df3bc54d183d673235b29cf1669c978dcc
-
SHA256
8615172da6f2114f1a7b0b41050f6a3556b725d5f8aec82cc4558504137e4299
-
SHA512
4384c8c5b05ca17191c5c3636808adc84ede226dd56c15fed4127aea830d141f920079a3e3fef6bca688911ca0185336cdf327bbbed57f8f311162a83032e578
-
SSDEEP
6144:RloZM9rIkd8g+EtXHkv/iD4fNPjpaC9Hop7mGzY8vI8e1m1Ji:joZOL+EP8fNPjpaC9Hop7mGzgqQ
Behavioral task
behavioral1
Sample
MinecraftCheat.exe
Resource
win7-20240508-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1247863670193786953/uhEecI9mXTqtTxrrZ3szFIc6tljBLxaaV_u2nDSM-ifuzaikK5Rp-LUeoymh7HdiyCVU
Targets
-
-
Target
MinecraftCheat.exe
-
Size
231KB
-
MD5
20384d9a8661d8d1c6baeba964939ba0
-
SHA1
e44f61df3bc54d183d673235b29cf1669c978dcc
-
SHA256
8615172da6f2114f1a7b0b41050f6a3556b725d5f8aec82cc4558504137e4299
-
SHA512
4384c8c5b05ca17191c5c3636808adc84ede226dd56c15fed4127aea830d141f920079a3e3fef6bca688911ca0185336cdf327bbbed57f8f311162a83032e578
-
SSDEEP
6144:RloZM9rIkd8g+EtXHkv/iD4fNPjpaC9Hop7mGzY8vI8e1m1Ji:joZOL+EP8fNPjpaC9Hop7mGzgqQ
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-