General
-
Target
Umbral.exe
-
Size
229KB
-
Sample
240703-sah7astgqh
-
MD5
1c34c800baf35d1e3434531040d07139
-
SHA1
c483bf994bc40f2f66dd3767df3c327c205301ee
-
SHA256
7faa7dc741f6cbee158e99306c59f254e878236501f8cca5d6c29ed2c2029f2a
-
SHA512
6f30a725e7eb759af2fdadfa10edf8daecd3c4c129571308db55cc19f969bac3f4ddd350d1831ca8f9eb1b7471617de9750b3aba92559299f1c688be2fccad07
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4ZfcHzZqStTY5rWWDPzb8e1mMti:noZtL+EP8ZfcHzZqStTY5rWWDvdk
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1258073166559973548/Af-anEOYadVQiNhuvW-Noyq5-b2RQLfjfpRQfpLyzOtY6g3BbSzURaD2_9z4RWreg7zX
Targets
-
-
Target
Umbral.exe
-
Size
229KB
-
MD5
1c34c800baf35d1e3434531040d07139
-
SHA1
c483bf994bc40f2f66dd3767df3c327c205301ee
-
SHA256
7faa7dc741f6cbee158e99306c59f254e878236501f8cca5d6c29ed2c2029f2a
-
SHA512
6f30a725e7eb759af2fdadfa10edf8daecd3c4c129571308db55cc19f969bac3f4ddd350d1831ca8f9eb1b7471617de9750b3aba92559299f1c688be2fccad07
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4ZfcHzZqStTY5rWWDPzb8e1mMti:noZtL+EP8ZfcHzZqStTY5rWWDvdk
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-