Overview
overview
10Static
static
3FATALITY c...TY.exe
windows7-x64
10FATALITY c...TY.exe
windows10-2004-x64
10FATALITY c...it.cfg
windows7-x64
3FATALITY c...it.cfg
windows10-2004-x64
3FATALITY c...ge.cfg
windows7-x64
3FATALITY c...ge.cfg
windows10-2004-x64
3FATALITY c...ck.pdb
windows7-x64
3FATALITY c...ck.pdb
windows10-2004-x64
3FATALITY c...or.dll
windows7-x64
1FATALITY c...or.dll
windows10-2004-x64
1General
-
Target
FATALITY crack.rar
-
Size
2.3MB
-
Sample
240716-mzhn6s1hjb
-
MD5
2d9edb8b836a7d1d711d7e63b6896be8
-
SHA1
54a29663eb88d245bda7d9fbe71d6c3bd86e4e59
-
SHA256
48fa7c81eedbd5766d91bf8794b21a925e31a5d153a23acdec9138cf4781a540
-
SHA512
9beb4d1dc5e63a5e88072bd5829dca8eb4f6871622c0c0ded513028e3e3c52f048fae9128de316c1cb0f386cbd2f3e03640e2132955f033afb33faffeb779af2
-
SSDEEP
49152:NF5exbmSVE8JxY5N+SN4N2oESKVBGRkZZ21XKcfB1LJ:NF5etI8JxY5QncQ1Xlft
Static task
static1
Behavioral task
behavioral1
Sample
FATALITY crack/FATALITY.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
FATALITY crack/FATALITY.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
FATALITY crack/cfg/legit.cfg
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
FATALITY crack/cfg/legit.cfg
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
FATALITY crack/cfg/rage.cfg
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
FATALITY crack/cfg/rage.cfg
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
FATALITY crack/crack.pdb
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
FATALITY crack/crack.pdb
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
FATALITY crack/injector.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
FATALITY crack/injector.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1262023513791795210/lh7elYm8P8VO-5cJhytgrq0ctoq8aDKbmp8g53xHgib8khvCb3mkeM8KrmYRaSRrsa45
Targets
-
-
Target
FATALITY crack/FATALITY.exe
-
Size
2.5MB
-
MD5
4320dae0d20c88ceb6f28b623a916dd2
-
SHA1
c1218c51804a602115462ea8259578fdbb280468
-
SHA256
441d4439cd72a239077d97895571804711356f1e1ded396c229635adf3c80ea4
-
SHA512
ee32e90d021835d608d43d3ee6d2d107fcfb15fa174c179ed4ae7dd47ec0dd45baadd1c73158c73d5e4fd7b89f5925ae505a6df66bb81e9d5693216316622fcf
-
SSDEEP
49152:U14vPsUk84QgsmsQgt/KOQtLvwnQ/7syEL+mZ1TxrYgHZfr2gsNS1zb9cVg1Z2U/:JPtmLgtTGTwQAyY3TdYCsI1zAgb27wh
Score10/10-
Detect Umbral payload
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
-
-
Target
FATALITY crack/cfg/legit.cfg
-
Size
39KB
-
MD5
dbeda5a7e2e95e70fc304c3a4e77a0df
-
SHA1
3298481bc57978c62332e0e94b500563bf3d90ee
-
SHA256
46d53ca05fca4a8cf440847de6a62d17a58c38a1d5aa57c6cb1acb3278bd362f
-
SHA512
367ab86c9d27582f234317def91cafdf4efea0f6fad95e44ee942a387b7d933ed4a2397fecebce3be179b18c6c1395eba5d7984ee613beb19a4ad16729dbd1ff
-
SSDEEP
768:Tddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddb:r
Score3/10 -
-
-
Target
FATALITY crack/cfg/rage.cfg
-
Size
187KB
-
MD5
8afa2113286ff459764485d570972a88
-
SHA1
4ea9847b651ae1841504b0d44622ae67e36c90f3
-
SHA256
b55e93983670dd54d4d492338e94bed3bced150c4e7c1e1fcdfd69b49f3c84b0
-
SHA512
834e3adca04b27b5722c3d27dc729dbc6f5befb350104851f081c6ee7d0d60a0f0e3a0904cc4effe4955b2e94b368c44121c9ba1cd11d0dea38b9898c3b72a8e
-
SSDEEP
768:Tddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddz:D
Score3/10 -
-
-
Target
FATALITY crack/crack.pdb
-
Size
175KB
-
MD5
bba057869db12538db08489b52e24f8e
-
SHA1
1f97afcdb8e6efdde576f8341b9db6e928c901e8
-
SHA256
3f2ffba4d665d930671518bdf7ccd59e1d63c7c0ae568e98d7e379fc40c952d1
-
SHA512
b4d793425ded065683ae9910545b00dea7b581bdebee6d543ceebb78e2d121e4447daa33a70f2e1066b676bffb04f9fa13fac7afdf5c2b23b05d33b4bb9a6469
-
SSDEEP
768:Tdddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd7:L
Score3/10 -
-
-
Target
FATALITY crack/injector.dll
-
Size
170KB
-
MD5
2bdf6c2175922c0c7b8fc10b475171fe
-
SHA1
d965953a56f441578ecf809e750f9dae722eeb22
-
SHA256
3cf2bc9edea167b1d820352d6f98f1793a6f381a8de7e04f5ab1dc27811408f7
-
SHA512
17458f631850dfd3bfd0f243b072741e2020a2e9f80e86a2aeced40742d5eba99447f646050c2c95090622e78c75505cae8aa8d09dc261c832e5b5d2e34f9b1b
-
SSDEEP
768:Tdddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd/:P
Score1/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1