General
-
Target
betaloader.exe
-
Size
482KB
-
Sample
240706-a4pbastand
-
MD5
f0463e89e4d196f296afb160224f63b0
-
SHA1
1ada6bf36121d08f96f4a09402774d3d5a065a7d
-
SHA256
d891136336eb391236b2cc2f6749440d9eb4dc8fc517eb1262cf739276657073
-
SHA512
8aacfd6f7c745d41bc639d90cb841652541ec17f7f745bd3ee9f2d24458b3b0c1a5d6b9d50a1e9a50a3e583841e4a443f8d930e626365bc729bff93d19528e34
-
SSDEEP
12288:6oZtL+EP8DWQVjgULgyD1Ac5H2xSY2RpX2ZrAyhteZN:+I86QVjgULgyD1Ac5HJBpX2Z3ts
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1254794965268299827/EE6SKfQhdH1VUguOzHvaA_cNjKMrNA7OYXHOMkNwJT_pYjMBf-9VvYMNTexyuwjEK14O
Targets
-
-
Target
betaloader.exe
-
Size
482KB
-
MD5
f0463e89e4d196f296afb160224f63b0
-
SHA1
1ada6bf36121d08f96f4a09402774d3d5a065a7d
-
SHA256
d891136336eb391236b2cc2f6749440d9eb4dc8fc517eb1262cf739276657073
-
SHA512
8aacfd6f7c745d41bc639d90cb841652541ec17f7f745bd3ee9f2d24458b3b0c1a5d6b9d50a1e9a50a3e583841e4a443f8d930e626365bc729bff93d19528e34
-
SSDEEP
12288:6oZtL+EP8DWQVjgULgyD1Ac5H2xSY2RpX2ZrAyhteZN:+I86QVjgULgyD1Ac5HJBpX2Z3ts
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-