General
-
Target
DroidCamappmdreash.exe
-
Size
485KB
-
Sample
240710-2cgkxstclq
-
MD5
702671a992bfd53ecfe53db95ace5780
-
SHA1
4186b1a1fa60a92cfa2aeaf1573839fe4dd3a6fe
-
SHA256
2976987f3bc3c8f28537347c4c642f9ad2864d9968917d4bfe8ceed4c8fb2c6b
-
SHA512
173a0af18d42bb171dee23841903d7ad81a09ac6221281df5660cbc4e1e0b3a1e007d6af55bb4fe5a87e27b76e256bd6ff94c972bed2caf44ffdbca66cb2ad0e
-
SSDEEP
12288:JLLob7STubLXytmeS1HCShL8/l5DQ3YuqUzttxv:JfI7Z441iMQ/DEfhtZ
Static task
static1
Behavioral task
behavioral1
Sample
DroidCamappmdreash.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
DroidCamappmdreash.exe
-
Size
485KB
-
MD5
702671a992bfd53ecfe53db95ace5780
-
SHA1
4186b1a1fa60a92cfa2aeaf1573839fe4dd3a6fe
-
SHA256
2976987f3bc3c8f28537347c4c642f9ad2864d9968917d4bfe8ceed4c8fb2c6b
-
SHA512
173a0af18d42bb171dee23841903d7ad81a09ac6221281df5660cbc4e1e0b3a1e007d6af55bb4fe5a87e27b76e256bd6ff94c972bed2caf44ffdbca66cb2ad0e
-
SSDEEP
12288:JLLob7STubLXytmeS1HCShL8/l5DQ3YuqUzttxv:JfI7Z441iMQ/DEfhtZ
Score10/10-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-