General
-
Target
Supercell Checker V2.rar
-
Size
2.5MB
-
Sample
240623-t2s19a1bll
-
MD5
6a85c4174345ae7048e0e23cfd9312fe
-
SHA1
18d1be693c0574700ffdbb320ceea2193eb4ef08
-
SHA256
f93b6b58f0e4a5e9188342452b12a3d06bcb06afb66330f1612b976590442206
-
SHA512
842004cd0030099ad69e8ac135be19b5cbda7c78250a5381031322b6e5a943e9f955abbdc78a0b820f25b9962900e0e68daa4c49174b55ed8594f48a6de6f7f7
-
SSDEEP
49152:CLefTZJlvn+7NQGtVFpBXyEd8BDlXwpDGQcKI652sC3mTX7eOp36A:EefdG7NQGR18xj652sCM1
Malware Config
Extracted
umbral
https://discordapp.com/api/webhooks/1254174290409160735/Qr-uInyE4mruCT3mG0YG1t46p_P8iCEfuzjPnBG_oUejRkL1fbzb_eGU4XrFW4GnRBaA
Targets
-
-
Target
Supercell Checker V2.rar
-
Size
2.5MB
-
MD5
6a85c4174345ae7048e0e23cfd9312fe
-
SHA1
18d1be693c0574700ffdbb320ceea2193eb4ef08
-
SHA256
f93b6b58f0e4a5e9188342452b12a3d06bcb06afb66330f1612b976590442206
-
SHA512
842004cd0030099ad69e8ac135be19b5cbda7c78250a5381031322b6e5a943e9f955abbdc78a0b820f25b9962900e0e68daa4c49174b55ed8594f48a6de6f7f7
-
SSDEEP
49152:CLefTZJlvn+7NQGtVFpBXyEd8BDlXwpDGQcKI652sC3mTX7eOp36A:EefdG7NQGR18xj652sCM1
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-