General
-
Target
Omoforia.exe
-
Size
216KB
-
Sample
240608-wjje7seh22
-
MD5
512441160e210a7696cc24bb5b07ebab
-
SHA1
ce8d0012808448dc249b6376a715e16400b7ead4
-
SHA256
319e8877d90fd746f2d47b0f713d1bd594c1b5973b4ffd8e03f881509964db5d
-
SHA512
4a60c13bbdaf63b4dd64706d9278e6a3a4b59c43ec8482fbcdbd1075af355f34ea45e9b57f31718dd8c7f1f9328fa3cbf132e2080dc16a245335fb71c3952146
-
SSDEEP
3072:JmpcjvqySgPAb+D9Cocawot18PeXdJBJg3plgsLSl8eN7s8m+XPcGTSYW:0cWoPAiRrt18aPJei8eNY8mWpS
Behavioral task
behavioral1
Sample
Omoforia.exe
Resource
win7-20231129-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1247011821861208064/PBIMaQOeZ36eCdxoHltfp-MYNGIEn0S3kpR6SGdqvNXasm61W35p7ziMGXfHhOeTq_1I
Targets
-
-
Target
Omoforia.exe
-
Size
216KB
-
MD5
512441160e210a7696cc24bb5b07ebab
-
SHA1
ce8d0012808448dc249b6376a715e16400b7ead4
-
SHA256
319e8877d90fd746f2d47b0f713d1bd594c1b5973b4ffd8e03f881509964db5d
-
SHA512
4a60c13bbdaf63b4dd64706d9278e6a3a4b59c43ec8482fbcdbd1075af355f34ea45e9b57f31718dd8c7f1f9328fa3cbf132e2080dc16a245335fb71c3952146
-
SSDEEP
3072:JmpcjvqySgPAb+D9Cocawot18PeXdJBJg3plgsLSl8eN7s8m+XPcGTSYW:0cWoPAiRrt18aPJei8eNY8mWpS
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-