General
-
Target
download.exe
-
Size
88KB
-
Sample
240608-jsvtdabc43
-
MD5
94c73dc6cc79de28524a82f04adc7c6b
-
SHA1
8ce1411adede8a1485ad718160ef01c7a22634de
-
SHA256
40596da4af2b1b0387147484d112423d317e2fd41cd19bb1b63d2f8429bacee4
-
SHA512
820b38de02b00668b24e6dc0510f632a7648bd1e647f5a9ee0c7d8bd8b86a49b55db72e1cfa2eff0337dc30d6b1cb45af1f904a9105715618d410ff56841d041
-
SSDEEP
768:+CIFqF93IfXwXbOfq1okh8BBEjpaPWfu/WYat7PTXDvt976xrXu5Me0:+C4qF9pbOAh8B+Bfu+YaZTXTt97KruM
Static task
static1
Behavioral task
behavioral1
Sample
download.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
download.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
download.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1248607651387146310/L22eWHFIaqQanWIJXuwKJbdlgO8LfAMUL1ag9JLuvBFDDekhSwD3f38KvJADfkAUnTsK
Targets
-
-
Target
download.exe
-
Size
88KB
-
MD5
94c73dc6cc79de28524a82f04adc7c6b
-
SHA1
8ce1411adede8a1485ad718160ef01c7a22634de
-
SHA256
40596da4af2b1b0387147484d112423d317e2fd41cd19bb1b63d2f8429bacee4
-
SHA512
820b38de02b00668b24e6dc0510f632a7648bd1e647f5a9ee0c7d8bd8b86a49b55db72e1cfa2eff0337dc30d6b1cb45af1f904a9105715618d410ff56841d041
-
SSDEEP
768:+CIFqF93IfXwXbOfq1okh8BBEjpaPWfu/WYat7PTXDvt976xrXu5Me0:+C4qF9pbOAh8B+Bfu+YaZTXTt97KruM
-
Detect Umbral payload
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-