General
-
Target
CS2RED_Checker.zip
-
Size
18.1MB
-
Sample
240703-rq8lfssfjb
-
MD5
5845377259e765b722b1a20c48b5bc7d
-
SHA1
aea4c56e80f7b7e229bfc15ba7cdc15f604d6e46
-
SHA256
e1eedf9077fe9a2532130dc80fcd13878835490f5eae82295805b7eb67691a82
-
SHA512
8f42eefe99bfa073f3ebb23ba3ce4138e1a9dec94e556a86a0ab26bfe7dd2dc5fe4511e5a80565cec8e70d221676d640b0b7d161d8646af373a1a2f043a1fac0
-
SSDEEP
393216:89j/EL3W7bU5wSD5vIxbklXGWI6r6nrrPivuaJlSSPQvPuja94MwNYz:89UWM57D6xgWz6r8/yu0dhUeYz
Behavioral task
behavioral1
Sample
CS2RED' Programs/CS2REDСhecker.exe
Resource
win7-20240508-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1257834381473747065/A4PdBtqpeMQGdn1UQ02Bvb8Scj6VK16zOyUctn2SFAznIBMMfKXT9QsfPt39umhw0A8L
Targets
-
-
Target
CS2RED' Programs/CS2REDСhecker.exe
-
Size
229KB
-
MD5
8171222317c30d31448205d70bca990f
-
SHA1
574d07820d3cb49c60a29defe88675072b9ae977
-
SHA256
d7a96d169d8c99e83b7a4eb920b8934cedeaa0ce1619d0cc677a83e0556ca2c2
-
SHA512
3a7f30a04f843294775b2501b9f51e4f2d2af4a834fa573791dcb2556526f4b834ac019bebab3fb9f062dd3012328cc2ea75db87df32d9b23346e2c495267e80
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD45S4Uhv0IH+2PxM4d5Zb8e1m4i:noZtL+EP85S4Uhv0IH+2PxM4dLq
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-