General
-
Target
New Project 1.exe
-
Size
2.8MB
-
Sample
240626-jnjkjstcpe
-
MD5
db5a82d0ebc91356da9a392623ef4091
-
SHA1
a264cb459225c04cfcc77d06286f043404abc995
-
SHA256
0c6199877d4e33673f8382783092bed633fb5c763cfecaefa868becb90552574
-
SHA512
51a88d50ca409e11355b0b1966298ab89c5003eabfca200af844dba4010fe22ac1e85525c9dcbd4afc06353d282d5579aa3fb1cf71218e7c5a0fd5ab789ceb8b
-
SSDEEP
49152:obKHLmcpC9UO0fabN1NVnfJVeAqqI8bmCMFjl4UwFUy:WznOaxVBYAqqNnIwFU
Static task
static1
Behavioral task
behavioral1
Sample
New Project 1.exe
Resource
win7-20240221-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1255429038366003240/9YDAKsGSDSiJ1xEzClPUYSZVpS45ZTl6_7d_FOyF3cPjShMYEnXZkIm_clQykNpdttDb
Targets
-
-
Target
New Project 1.exe
-
Size
2.8MB
-
MD5
db5a82d0ebc91356da9a392623ef4091
-
SHA1
a264cb459225c04cfcc77d06286f043404abc995
-
SHA256
0c6199877d4e33673f8382783092bed633fb5c763cfecaefa868becb90552574
-
SHA512
51a88d50ca409e11355b0b1966298ab89c5003eabfca200af844dba4010fe22ac1e85525c9dcbd4afc06353d282d5579aa3fb1cf71218e7c5a0fd5ab789ceb8b
-
SSDEEP
49152:obKHLmcpC9UO0fabN1NVnfJVeAqqI8bmCMFjl4UwFUy:WznOaxVBYAqqNnIwFU
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-