General
-
Target
runtime.exe-cleaned.xex
-
Size
237KB
-
Sample
240621-1t9glawfkr
-
MD5
46393ff2b520d8bda33fd91b4d665df7
-
SHA1
09578afe920c3645b594e9dfcb6ed740d4004ba8
-
SHA256
386f5d72b857d35535ec5fbb48d107b4f16d869c4d08255b3626467dbea7e7c8
-
SHA512
022c610c7fa3d97699917f067253278cf37b648017669621f9f6ca1ab4a02a8e8b4bd468fde1f54d068a5b87f38ae64642d12a12f7056054783eae7c0a93e647
-
SSDEEP
6144:u7y5qD1ckBGLMcB+tdHkv/oAGHW0IBtP6xnQ/R8e1m5A:uW5q4xB+7LHOBtln
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1253727360612565146/GPXhqKT1NSrraBQLuH8gtIYaOWpwLAKzG0rig8YL1y-8OLUxOXzEorlAa8fHImB7LRO9
Targets
-
-
Target
runtime.exe-cleaned.xex
-
Size
237KB
-
MD5
46393ff2b520d8bda33fd91b4d665df7
-
SHA1
09578afe920c3645b594e9dfcb6ed740d4004ba8
-
SHA256
386f5d72b857d35535ec5fbb48d107b4f16d869c4d08255b3626467dbea7e7c8
-
SHA512
022c610c7fa3d97699917f067253278cf37b648017669621f9f6ca1ab4a02a8e8b4bd468fde1f54d068a5b87f38ae64642d12a12f7056054783eae7c0a93e647
-
SSDEEP
6144:u7y5qD1ckBGLMcB+tdHkv/oAGHW0IBtP6xnQ/R8e1m5A:uW5q4xB+7LHOBtln
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-