General
-
Target
S500RAT.exe
-
Size
12.4MB
-
Sample
240704-j7mrbasbnq
-
MD5
eca30bacd3085f447705c090cf780563
-
SHA1
86d0d579742aeae2bea804b065abfa9ebf02b952
-
SHA256
a5e929a6859512632ededb0d04f9b706fcc8568f828047fae99f2767f4f6c783
-
SHA512
9c6ca62412486459c36818756aeb694caa9c6520e3178534ce1e0c2017df78e8fe359ef9f2ee8faaa8791ebd1fea99edcb4c15315b7294e0366ab4f00d3107b3
-
SSDEEP
196608:PQb6doh5jCqj6dehxHTOf+Ce2XkuujHWRcQRO7F0p/GChj171pZqeYAtmk3BC:kionuqjtxVRA+BQQGprjbvqeYZwBC
Static task
static1
Behavioral task
behavioral1
Sample
S500RAT.exe
Resource
win7-20240611-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1241894578668306453/YE8mVIJLGG7vF4W-wKbO1sJc6Tx9XoUX9OTvB4fFiYWrALppn6EFkHHwMHAiSo-VJSAk
Targets
-
-
Target
S500RAT.exe
-
Size
12.4MB
-
MD5
eca30bacd3085f447705c090cf780563
-
SHA1
86d0d579742aeae2bea804b065abfa9ebf02b952
-
SHA256
a5e929a6859512632ededb0d04f9b706fcc8568f828047fae99f2767f4f6c783
-
SHA512
9c6ca62412486459c36818756aeb694caa9c6520e3178534ce1e0c2017df78e8fe359ef9f2ee8faaa8791ebd1fea99edcb4c15315b7294e0366ab4f00d3107b3
-
SSDEEP
196608:PQb6doh5jCqj6dehxHTOf+Ce2XkuujHWRcQRO7F0p/GChj171pZqeYAtmk3BC:kionuqjtxVRA+BQQGprjbvqeYZwBC
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-