General
-
Target
PlagueByKitty.exe
-
Size
494KB
-
Sample
240619-m19jaatcln
-
MD5
3fc34ffadd0750eab33911bc15c17c64
-
SHA1
ae8f5f769bc88728573e1505cb9fded184cde758
-
SHA256
cdf0afcac0224a29fd1f7f02157a28f2ece5581a49fede543b337907af1d9288
-
SHA512
eb196328793fe450ded192c3ea4b57bc6b74a4fd1fff67b3fdc234a9c4efdc1c41d7e678ec3969dc2277d808e5a30505bf3888e1af4ae3caff5877850c1c6f89
-
SSDEEP
6144:PloZM+rIkd8g+EtXHkv/iD4qPxkU69VeQbGkFZwPF5b8e1m4iebT:toZtL+EP8qPxkU69VeQbGkFZwny
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1252939244289130598/Yg-57hNdAnH4sSAJSqQ-NFZ9RWZCgUPD8PvTftfj7GfuPzHKwGXhfWsyJ8Vf9Cp8-gSr
Targets
-
-
Target
PlagueByKitty.exe
-
Size
494KB
-
MD5
3fc34ffadd0750eab33911bc15c17c64
-
SHA1
ae8f5f769bc88728573e1505cb9fded184cde758
-
SHA256
cdf0afcac0224a29fd1f7f02157a28f2ece5581a49fede543b337907af1d9288
-
SHA512
eb196328793fe450ded192c3ea4b57bc6b74a4fd1fff67b3fdc234a9c4efdc1c41d7e678ec3969dc2277d808e5a30505bf3888e1af4ae3caff5877850c1c6f89
-
SSDEEP
6144:PloZM+rIkd8g+EtXHkv/iD4qPxkU69VeQbGkFZwPF5b8e1m4iebT:toZtL+EP8qPxkU69VeQbGkFZwny
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-