Resubmissions
16-07-2024 21:58
240716-1vxjessaqm 10General
-
Target
FATALITY.exe
-
Size
2.5MB
-
Sample
240716-1vxjessaqm
-
MD5
4320dae0d20c88ceb6f28b623a916dd2
-
SHA1
c1218c51804a602115462ea8259578fdbb280468
-
SHA256
441d4439cd72a239077d97895571804711356f1e1ded396c229635adf3c80ea4
-
SHA512
ee32e90d021835d608d43d3ee6d2d107fcfb15fa174c179ed4ae7dd47ec0dd45baadd1c73158c73d5e4fd7b89f5925ae505a6df66bb81e9d5693216316622fcf
-
SSDEEP
49152:U14vPsUk84QgsmsQgt/KOQtLvwnQ/7syEL+mZ1TxrYgHZfr2gsNS1zb9cVg1Z2U/:JPtmLgtTGTwQAyY3TdYCsI1zAgb27wh
Static task
static1
Malware Config
Targets
-
-
Target
FATALITY.exe
-
Size
2.5MB
-
MD5
4320dae0d20c88ceb6f28b623a916dd2
-
SHA1
c1218c51804a602115462ea8259578fdbb280468
-
SHA256
441d4439cd72a239077d97895571804711356f1e1ded396c229635adf3c80ea4
-
SHA512
ee32e90d021835d608d43d3ee6d2d107fcfb15fa174c179ed4ae7dd47ec0dd45baadd1c73158c73d5e4fd7b89f5925ae505a6df66bb81e9d5693216316622fcf
-
SSDEEP
49152:U14vPsUk84QgsmsQgt/KOQtLvwnQ/7syEL+mZ1TxrYgHZfr2gsNS1zb9cVg1Z2U/:JPtmLgtTGTwQAyY3TdYCsI1zAgb27wh
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-