General
-
Target
Umbral.exe
-
Size
231KB
-
Sample
240605-yejaraff4y
-
MD5
c3aa0f5ac11d11f2a741c0502d4cd3a2
-
SHA1
96736e1e76a2f59c460a85472a58bc98dc8bd084
-
SHA256
928ff5c9bb5e02499ed4611c84ff1b2b8bd498f6db9451f8d7f5fa78202d37ef
-
SHA512
854b49c85e976a101d8e6c1fe2cf14f7cb99f5025d29a2f0636796fec9d745bafe606223de3b79339a7f98b746f005aec72483d984620a99648ec4ea9c649d21
-
SSDEEP
6144:xloZM+rIkd8g+EtXHkv/iD4alC0ad1+57mEl5QIf7tLJh8e1mAai:DoZtL+EP8alC0ad1+57mEl5QIRLzLf
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1247998394866339961/eoD_WLQINT3umixNrhhmADOvlQrs7MT_mFTy66H-czWd3woByI6Fvc8Ha5Xz_WZqYf0Q
Targets
-
-
Target
Umbral.exe
-
Size
231KB
-
MD5
c3aa0f5ac11d11f2a741c0502d4cd3a2
-
SHA1
96736e1e76a2f59c460a85472a58bc98dc8bd084
-
SHA256
928ff5c9bb5e02499ed4611c84ff1b2b8bd498f6db9451f8d7f5fa78202d37ef
-
SHA512
854b49c85e976a101d8e6c1fe2cf14f7cb99f5025d29a2f0636796fec9d745bafe606223de3b79339a7f98b746f005aec72483d984620a99648ec4ea9c649d21
-
SSDEEP
6144:xloZM+rIkd8g+EtXHkv/iD4alC0ad1+57mEl5QIf7tLJh8e1mAai:DoZtL+EP8alC0ad1+57mEl5QIRLzLf
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-