General
-
Target
googaga.exe
-
Size
229KB
-
Sample
240630-h68fysxhrl
-
MD5
bb8f1f278c259560f803b9e3ddaab6d7
-
SHA1
839877183007a9e042f9e7c5506d8830f7337b30
-
SHA256
ebcbd3447da7718cc8e4a60e88ca8b4d1c707ffdd3e2aae75adccd0c6a845997
-
SHA512
cdd9e9b95202ff3c081bb85cecb449e470770703b7b3ebf27f4c4af28b3a312be742c8dc4b000632ace7c5a2d700f8e4a26db362594f871390c9582c494f1bb4
-
SSDEEP
6144:lloZM9rIkd8g+EtXHkv/iD4f1YxndLocD+abtIExHNb8e1mai:noZOL+EP8f1YxndLocD+abtIExt8
Behavioral task
behavioral1
Sample
googaga.exe
Resource
win7-20240611-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1256869688487710730/3Fj510GAhIc5eHrXmSNeNQgCXtDIkrV654Xp5RicQTcyuhg2Jty3efrsKc3zfTViSvsg
Targets
-
-
Target
googaga.exe
-
Size
229KB
-
MD5
bb8f1f278c259560f803b9e3ddaab6d7
-
SHA1
839877183007a9e042f9e7c5506d8830f7337b30
-
SHA256
ebcbd3447da7718cc8e4a60e88ca8b4d1c707ffdd3e2aae75adccd0c6a845997
-
SHA512
cdd9e9b95202ff3c081bb85cecb449e470770703b7b3ebf27f4c4af28b3a312be742c8dc4b000632ace7c5a2d700f8e4a26db362594f871390c9582c494f1bb4
-
SSDEEP
6144:lloZM9rIkd8g+EtXHkv/iD4f1YxndLocD+abtIExHNb8e1mai:noZOL+EP8f1YxndLocD+abtIExt8
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-