General
-
Target
2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db
-
Size
106KB
-
Sample
240622-x258csvfrm
-
MD5
b06c811554508247282dc00b7a82b0ef
-
SHA1
1574070e54ae15a93b8a9ecd4a40a98cfb2f1a71
-
SHA256
2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db
-
SHA512
f9f1f1c75ac472e4167ecba2811eae3b66c7023bd9257c310e2469be8b796010cb0657244640e2525f46464cee894bef87d284fb02b5ee3439d3f23ab45a8c6e
-
SSDEEP
3072:GmqRL49gVu4HLM2daP8NJYHttq9iZLSHdUvynNe9nLsZ:GbeIM4/JY7q9SLS9Eynw9nL
Static task
static1
Behavioral task
behavioral1
Sample
2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1188379475021410374/Ssj5Ns9zjIl8_hao3wt15snRVqwtBYjDt8QLCtqPC4z6ltGHrqIRWciPemKhTAJ3Ea_2
Targets
-
-
Target
2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db
-
Size
106KB
-
MD5
b06c811554508247282dc00b7a82b0ef
-
SHA1
1574070e54ae15a93b8a9ecd4a40a98cfb2f1a71
-
SHA256
2083f10b11097d67563cd88af575bd6aeb4d07fb0b016666058fd6c2072297db
-
SHA512
f9f1f1c75ac472e4167ecba2811eae3b66c7023bd9257c310e2469be8b796010cb0657244640e2525f46464cee894bef87d284fb02b5ee3439d3f23ab45a8c6e
-
SSDEEP
3072:GmqRL49gVu4HLM2daP8NJYHttq9iZLSHdUvynNe9nLsZ:GbeIM4/JY7q9SLS9Eynw9nL
Score10/10-
Detect Umbral payload
-
Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
-
Detects executables Discord URL observed in first stage droppers
-
Detects executables attemping to enumerate video devices using WMI
-
Detects executables containing possible sandbox analysis VM names
-
Detects executables containing possible sandbox analysis VM usernames
-
Detects executables containing possible sandbox system UUIDs
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-