General
-
Target
FarmInject.exe
-
Size
231KB
-
Sample
240719-l3p2zsyepg
-
MD5
06266d2df2b7ca91e7b3b7a26b13d3f8
-
SHA1
bd85f02d1e81eae97d802bb23a24ab70fb054f45
-
SHA256
1bb943ec9c40c294f145ecaf7701ddb78e3569f6b0b0224117dbcafb970bd34b
-
SHA512
dc641d76013a3016479e86fa2d5b97280cb507abc1385bd0b63b713b167bd44f8189e6728a5c00001454dfe6ffaf3a818d13c4797ee0861948d9bcbf7528ce4b
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4fl9cw2xpaRPyAxVkkAb8e1mvcnr4vi:joZtL+EP8fl9cw2xpaRPyAxVkZecr46
Behavioral task
behavioral1
Sample
FarmInject.exe
Resource
win7-20240708-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1262281731940286584/J9aq7zxJAAFFldypmIl7eyd1g9jLOM5K-apzBybJhhwGHhSAubIJiS351ZVG0RhBcqeD
Targets
-
-
Target
FarmInject.exe
-
Size
231KB
-
MD5
06266d2df2b7ca91e7b3b7a26b13d3f8
-
SHA1
bd85f02d1e81eae97d802bb23a24ab70fb054f45
-
SHA256
1bb943ec9c40c294f145ecaf7701ddb78e3569f6b0b0224117dbcafb970bd34b
-
SHA512
dc641d76013a3016479e86fa2d5b97280cb507abc1385bd0b63b713b167bd44f8189e6728a5c00001454dfe6ffaf3a818d13c4797ee0861948d9bcbf7528ce4b
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4fl9cw2xpaRPyAxVkkAb8e1mvcnr4vi:joZtL+EP8fl9cw2xpaRPyAxVkZecr46
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-