General
-
Target
Umbral.exe
-
Size
229KB
-
Sample
240718-z1vrcawgmj
-
MD5
47a00d21a6b9b87b9ff9d9190d820531
-
SHA1
f70756addfdffe4333ea2811233c15c3923a3a2f
-
SHA256
3fc208899b7c2f6208b31ead1b538808dac5fbcc79de62ca867ee0f27064e6ac
-
SHA512
b9cbcf10cd9024449524a3554f37cf73bbdf9c983a7c2cfe605eb581902eb9c7e450277e9d627607c2ad369fd415ec141109559a3371198d5ee0a37d2d21a2cc
-
SSDEEP
6144:lloZMLrIkd8g+EtXHkv/iD4lAMc1aYe5xyRXKYZd8l0b8e1maqvRei:noZ0L+EP8WMc1aYe5xyRXKYZd8WJqvRT
Behavioral task
behavioral1
Sample
Umbral.exe
Resource
win7-20240708-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1260936672724385829/8zvimZzQuHtU4AEMjra0gNXPNmEl8F0OXX5Y66cA5fxhOuePu2AFpfI5VOJ7uiyNYne5
Targets
-
-
Target
Umbral.exe
-
Size
229KB
-
MD5
47a00d21a6b9b87b9ff9d9190d820531
-
SHA1
f70756addfdffe4333ea2811233c15c3923a3a2f
-
SHA256
3fc208899b7c2f6208b31ead1b538808dac5fbcc79de62ca867ee0f27064e6ac
-
SHA512
b9cbcf10cd9024449524a3554f37cf73bbdf9c983a7c2cfe605eb581902eb9c7e450277e9d627607c2ad369fd415ec141109559a3371198d5ee0a37d2d21a2cc
-
SSDEEP
6144:lloZMLrIkd8g+EtXHkv/iD4lAMc1aYe5xyRXKYZd8l0b8e1maqvRei:noZ0L+EP8WMc1aYe5xyRXKYZd8WJqvRT
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-