General
-
Target
Nursultan.exe
-
Size
13.3MB
-
Sample
240709-189e5s1cna
-
MD5
f6c0feffe54fa282026b99660ee2f36e
-
SHA1
1df776d7ee9fca88331dd7451704811ffaaeeca9
-
SHA256
a8e15ff3f763f5f153b46ba983847396c121e055942473863aaf40368e62c198
-
SHA512
bb14c616b5e0dd6259e24ce8a9c2e6f5fd5e40518c8f13a200b52330c56465620460d24b2f820b34615b9120fbeb8d366bfc80b7d6ab88d8adfcf3e7e19afe23
-
SSDEEP
196608:nB2xmjsScoe5Q1QmUrctfXJqsg/WAGlBE32no2qouSgiKB0nOgM8pg50d1/Kc6IX:imIFTmUIwsgCm3t2GyKG5jMtIQvA9
Static task
static1
Malware Config
Targets
-
-
Target
Nursultan.exe
-
Size
13.3MB
-
MD5
f6c0feffe54fa282026b99660ee2f36e
-
SHA1
1df776d7ee9fca88331dd7451704811ffaaeeca9
-
SHA256
a8e15ff3f763f5f153b46ba983847396c121e055942473863aaf40368e62c198
-
SHA512
bb14c616b5e0dd6259e24ce8a9c2e6f5fd5e40518c8f13a200b52330c56465620460d24b2f820b34615b9120fbeb8d366bfc80b7d6ab88d8adfcf3e7e19afe23
-
SSDEEP
196608:nB2xmjsScoe5Q1QmUrctfXJqsg/WAGlBE32no2qouSgiKB0nOgM8pg50d1/Kc6IX:imIFTmUIwsgCm3t2GyKG5jMtIQvA9
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-