General
-
Target
Umbral.exe
-
Size
229KB
-
Sample
240623-k9vqdaxcka
-
MD5
ffa20ab6d589e2605c984114e8a74fb5
-
SHA1
c4738ace703f63bb92aa228e1c30429a5a95239c
-
SHA256
7a8e464571d3e3cee53f601b46d96a2602158e30ee7a1d8e1eebb148fece0d39
-
SHA512
38d87fb70e31309122cc568677d2c67ff06d31e774f33217e33a3c117bf96709f37ea479501072132fb55911ccd30a02bae3423135aaffd5d8cc673d20f68497
-
SSDEEP
6144:FloZM3fsXtioRkts/cnnK6cMl4F/Gv8il92eDe8NhoMfb8e1m+i:HoZ1tlRk83Ml4dGv8il92eDe8Nhous
Behavioral task
behavioral1
Sample
Umbral.exe
Resource
win10-20240404-en
Malware Config
Extracted
umbral
https://ptb.discord.com/api/webhooks/1254364048615800832/LFd9nvq4veWgoUr9qJVwW8J_2qmrASlKxmdI3KCWzLtOX3IcIcHkI3t6_82CEiC-Eefz
Targets
-
-
Target
Umbral.exe
-
Size
229KB
-
MD5
ffa20ab6d589e2605c984114e8a74fb5
-
SHA1
c4738ace703f63bb92aa228e1c30429a5a95239c
-
SHA256
7a8e464571d3e3cee53f601b46d96a2602158e30ee7a1d8e1eebb148fece0d39
-
SHA512
38d87fb70e31309122cc568677d2c67ff06d31e774f33217e33a3c117bf96709f37ea479501072132fb55911ccd30a02bae3423135aaffd5d8cc673d20f68497
-
SSDEEP
6144:FloZM3fsXtioRkts/cnnK6cMl4F/Gv8il92eDe8NhoMfb8e1m+i:HoZ1tlRk83Ml4dGv8il92eDe8Nhous
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-