General
-
Target
ElectricLauncher.7z
-
Size
51.7MB
-
Sample
240623-r9gbbayemj
-
MD5
82acc0fd6a29645595b2cc235b1291d6
-
SHA1
f76feb791082c7a835f7f09b547cd3a158b334fc
-
SHA256
367a357e41829b8e57dfc83d516eef9f6280826967db5b5b92fe9514e84de368
-
SHA512
631187f289efec321aaf773e5e30ccc24b4b40d86b947dcb578e87a47f51ea6d656d1b248b5ac4b417166919105d3234debab0569add4f7fac037ac739ce49f2
-
SSDEEP
1572864:ILfAxxnZhdeF5qvIH6Bifh/YocC4RzICSVL0TXjSjH3K:ILoxtYF0IaBilTcCVC44TiH3K
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1254415293199945749/fmmqbkHSip_I3fhu39jloEA38uyrT0z1u8S8mtWIh9LGi-fMXG8TKLssPsqFrn6Y_pNZ
Targets
-
-
Target
ElectricLauncher.7z
-
Size
51.7MB
-
MD5
82acc0fd6a29645595b2cc235b1291d6
-
SHA1
f76feb791082c7a835f7f09b547cd3a158b334fc
-
SHA256
367a357e41829b8e57dfc83d516eef9f6280826967db5b5b92fe9514e84de368
-
SHA512
631187f289efec321aaf773e5e30ccc24b4b40d86b947dcb578e87a47f51ea6d656d1b248b5ac4b417166919105d3234debab0569add4f7fac037ac739ce49f2
-
SSDEEP
1572864:ILfAxxnZhdeF5qvIH6Bifh/YocC4RzICSVL0TXjSjH3K:ILoxtYF0IaBilTcCVC44TiH3K
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-